The paper describes an enterprise management system which provides an integrated approach to tackle management relevant topics like business process management, quality management, audit management, internal risk and control management, enterprise architecture management, compliance management and so on within a single information system. The term "enterprise management system (EMS)" is introduced for such a kind of management system. A business process pyramid is defined to link the strategic with the operational level of processes and all attached management-relevant information, e.g. audits, risks, etc. The approach was successfully implemented in the enterprise management system DHC VISION, which is used today worldwide by medium- and large-sized enterprises.
{"title":"Business Process Management as Basis for Enterprise Management Systems","authors":"Andreas Lux, J. Hess, R. Herterich","doi":"10.1109/CBI.2013.57","DOIUrl":"https://doi.org/10.1109/CBI.2013.57","url":null,"abstract":"The paper describes an enterprise management system which provides an integrated approach to tackle management relevant topics like business process management, quality management, audit management, internal risk and control management, enterprise architecture management, compliance management and so on within a single information system. The term \"enterprise management system (EMS)\" is introduced for such a kind of management system. A business process pyramid is defined to link the strategic with the operational level of processes and all attached management-relevant information, e.g. audits, risks, etc. The approach was successfully implemented in the enterprise management system DHC VISION, which is used today worldwide by medium- and large-sized enterprises.","PeriodicalId":443410,"journal":{"name":"2013 IEEE 15th Conference on Business Informatics","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123118015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taylorism and Fordism need to be questioned as modeling paradigm in BPM in changing work environments in a global economy, in particular for describing and implementing flexible business processes. In this article we demonstrate fundamental capabilities of communication-based modeling facilitating change management. The introduced subject-oriented BPM approach (S-BPM) recognizes subjects as active elements in a business process. They communicate with each other, not only to coordinate their work, but also capturing unpredictable events. Moreover, the S-BPM representation scheme covers how subjects are embedded into specific organizational and technical environments for operation, as validated models can be executed automatically. Such a streamlined separation of implementation and logical model increases the flexibility of business processes, and hereby the velocity of organizations significantly. The approach has already been successfully applied in several industrial projects, as shown by the evaluation results.
{"title":"(Re-)Justifying BPM: A Quest for the Interaction Turn Reviewing Subject-Oriented BPM","authors":"A. Fleischmann, W. Schmidt, C. Stary","doi":"10.1109/CBI.2013.40","DOIUrl":"https://doi.org/10.1109/CBI.2013.40","url":null,"abstract":"Taylorism and Fordism need to be questioned as modeling paradigm in BPM in changing work environments in a global economy, in particular for describing and implementing flexible business processes. In this article we demonstrate fundamental capabilities of communication-based modeling facilitating change management. The introduced subject-oriented BPM approach (S-BPM) recognizes subjects as active elements in a business process. They communicate with each other, not only to coordinate their work, but also capturing unpredictable events. Moreover, the S-BPM representation scheme covers how subjects are embedded into specific organizational and technical environments for operation, as validated models can be executed automatically. Such a streamlined separation of implementation and logical model increases the flexibility of business processes, and hereby the velocity of organizations significantly. The approach has already been successfully applied in several industrial projects, as shown by the evaluation results.","PeriodicalId":443410,"journal":{"name":"2013 IEEE 15th Conference on Business Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114441000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social BPM describes efforts in a management and technology dimension to overcome shortcomings of traditional BPM. Subject-oriented Business Process Management (S-BPM) is an emerging approach focusing on adjusted interaction and individual behavior of stakeholders in business operation. This contribution reveals how S-BPM as a per se social technology incorporates both, management, and technology issues of Social BPM.
{"title":"Subject-Oriented BPM = Socially Executable BPM","authors":"A. Fleischmann, W. Schmidt, C. Stary","doi":"10.1109/CBI.2013.64","DOIUrl":"https://doi.org/10.1109/CBI.2013.64","url":null,"abstract":"Social BPM describes efforts in a management and technology dimension to overcome shortcomings of traditional BPM. Subject-oriented Business Process Management (S-BPM) is an emerging approach focusing on adjusted interaction and individual behavior of stakeholders in business operation. This contribution reveals how S-BPM as a per se social technology incorporates both, management, and technology issues of Social BPM.","PeriodicalId":443410,"journal":{"name":"2013 IEEE 15th Conference on Business Informatics","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117243354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Redesign of business processes is an activity frequently performed in modern organizations as a response to intrinsic and extrinsic change requirements. The way (methods, techniques, tools) a process is redesigned varies greatly with the process context. In contrast, involving stakeholders of a process in process redesign can be considered a common practice throughout organizations of all kinds. Hence, research and industry have only recently investigated the characteristics of collaboration in process redesign and the challenges that arise for software-support respectively. In this paper we will systematically describe findings from a case-study where we adapted a particular type of collaboration technology - a wiki engine - towards collaborative process modeling support and exposed it to a real-world setting. The case-study shows how a small team of domain experts within a large office supply manufacturing company redesigned a recruiting process by using a wiki as their primary process modeling environment.
{"title":"A Case-Study of Wiki-Supported Collaborative Drafting of Business Processes Models","authors":"Selim Erol, G. Neumann","doi":"10.1109/CBI.2013.62","DOIUrl":"https://doi.org/10.1109/CBI.2013.62","url":null,"abstract":"Redesign of business processes is an activity frequently performed in modern organizations as a response to intrinsic and extrinsic change requirements. The way (methods, techniques, tools) a process is redesigned varies greatly with the process context. In contrast, involving stakeholders of a process in process redesign can be considered a common practice throughout organizations of all kinds. Hence, research and industry have only recently investigated the characteristics of collaboration in process redesign and the challenges that arise for software-support respectively. In this paper we will systematically describe findings from a case-study where we adapted a particular type of collaboration technology - a wiki engine - towards collaborative process modeling support and exposed it to a real-world setting. The case-study shows how a small team of domain experts within a large office supply manufacturing company redesigned a recruiting process by using a wiki as their primary process modeling environment.","PeriodicalId":443410,"journal":{"name":"2013 IEEE 15th Conference on Business Informatics","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129658577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kari Hiekkanen, J. Korhonen, J. Collin, Elisabete Patricio, M. Helenius, J. Mykkänen
Enterprise Architecture (EA) is increasingly being utilized by organizations as an approach to manage the complexity of business processes, information systems and technical infrastructure. Although EA is generally regarded as an effective management tool, its full benefits can be realized only when it is incorporated into day-to-day operations of the organization. In the Finnish public sector, the use of EA has recently been mandated by the newly passed Act on Information Management Governance in Public Administration. The aim of the legislation is to achieve more efficient, integrated and cost-efficient public services. This article describes the results of a survey aimed to identify perceptions on actual EA work among Finnish public sector participants currently undertaking EA initiatives. The results highlight potential issues related to successful EA adoption.
{"title":"Architects' Perceptions on EA Use -- An Empirical Study","authors":"Kari Hiekkanen, J. Korhonen, J. Collin, Elisabete Patricio, M. Helenius, J. Mykkänen","doi":"10.1109/CBI.2013.48","DOIUrl":"https://doi.org/10.1109/CBI.2013.48","url":null,"abstract":"Enterprise Architecture (EA) is increasingly being utilized by organizations as an approach to manage the complexity of business processes, information systems and technical infrastructure. Although EA is generally regarded as an effective management tool, its full benefits can be realized only when it is incorporated into day-to-day operations of the organization. In the Finnish public sector, the use of EA has recently been mandated by the newly passed Act on Information Management Governance in Public Administration. The aim of the legislation is to achieve more efficient, integrated and cost-efficient public services. This article describes the results of a survey aimed to identify perceptions on actual EA work among Finnish public sector participants currently undertaking EA initiatives. The results highlight potential issues related to successful EA adoption.","PeriodicalId":443410,"journal":{"name":"2013 IEEE 15th Conference on Business Informatics","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The accelerated adoption of cloud computing among enterprises is due to the multiple benefits the technology provides, one of them the simplification of inter-organizational information sharing, which is of utmost importance in healthcare. Nevertheless, moving sensitive health records to the cloud still implies severe security and privacy risks. With this background, we present a novel secure architecture for sharing electronic health records in a cloud environment. We first conducted a systematic literature review and interviews with different experts from the German healthcare industry that allowed us to derive real-world processes and corresponding security and privacy requirements. Based on these results, we designed our multi-provider cloud architecture that satisfies many of the requirements by providing increased availability, confidentiality and integrity of the medical records stored in the cloud. This architecture features secret sharing as an important measure to distribute health records as fragments to different cloud services, which can provide higher redundancy and additional security and privacy protection in the case of key compromise, broken encryption algorithms or their insecure implementation. Finally, we evaluate and select a secret-sharing algorithm for our multi-cloud architecture. We implemented both Shamir's secret-sharing scheme and Rabin's information dispersal algorithm and performed several experiments measuring the execution time. Our results indicate that an adoption of Rabin's algorithm would create a low overhead, giving strong indicators to the feasibility of our approach.
{"title":"Secret Sharing for Health Data in Multi-provider Clouds","authors":"Tatiana Ermakova, Benjamin Fabian","doi":"10.1109/CBI.2013.22","DOIUrl":"https://doi.org/10.1109/CBI.2013.22","url":null,"abstract":"The accelerated adoption of cloud computing among enterprises is due to the multiple benefits the technology provides, one of them the simplification of inter-organizational information sharing, which is of utmost importance in healthcare. Nevertheless, moving sensitive health records to the cloud still implies severe security and privacy risks. With this background, we present a novel secure architecture for sharing electronic health records in a cloud environment. We first conducted a systematic literature review and interviews with different experts from the German healthcare industry that allowed us to derive real-world processes and corresponding security and privacy requirements. Based on these results, we designed our multi-provider cloud architecture that satisfies many of the requirements by providing increased availability, confidentiality and integrity of the medical records stored in the cloud. This architecture features secret sharing as an important measure to distribute health records as fragments to different cloud services, which can provide higher redundancy and additional security and privacy protection in the case of key compromise, broken encryption algorithms or their insecure implementation. Finally, we evaluate and select a secret-sharing algorithm for our multi-cloud architecture. We implemented both Shamir's secret-sharing scheme and Rabin's information dispersal algorithm and performed several experiments measuring the execution time. Our results indicate that an adoption of Rabin's algorithm would create a low overhead, giving strong indicators to the feasibility of our approach.","PeriodicalId":443410,"journal":{"name":"2013 IEEE 15th Conference on Business Informatics","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a business-to-business collaborative setting, a choreography and a business contract (service agreement) are two specifications that describe permissible interactions between partners from different view points, emphasising different aspects. A choreography specification is a description, from a global perspective, of all permissible message exchange sequences between the partners. A business contract on the other hand specifies what operations the business partners have the rights, obligations or prohibitions to execute, it also stipulates when the operations are to be executed and in which order. It is naturally important to make sure that message exchanges as encoded in a given choreography conform to (are in accordance with) the contract between the partners. In other words, make sure that any message interaction permitted in the choreography will not cause a breach of the contract. The paper develops the concept of conformance between a contract and a choreography assuming that they can be modelled by Finite Automata. This approach opens the way for automatically establishing conformance by using model checking techniques.
{"title":"Establishing Conformance between Contracts and Choreographies","authors":"Carlos Molina-Jiménez, S. Shrivastava","doi":"10.1109/CBI.2013.19","DOIUrl":"https://doi.org/10.1109/CBI.2013.19","url":null,"abstract":"In a business-to-business collaborative setting, a choreography and a business contract (service agreement) are two specifications that describe permissible interactions between partners from different view points, emphasising different aspects. A choreography specification is a description, from a global perspective, of all permissible message exchange sequences between the partners. A business contract on the other hand specifies what operations the business partners have the rights, obligations or prohibitions to execute, it also stipulates when the operations are to be executed and in which order. It is naturally important to make sure that message exchanges as encoded in a given choreography conform to (are in accordance with) the contract between the partners. In other words, make sure that any message interaction permitted in the choreography will not cause a breach of the contract. The paper develops the concept of conformance between a contract and a choreography assuming that they can be modelled by Finite Automata. This approach opens the way for automatically establishing conformance by using model checking techniques.","PeriodicalId":443410,"journal":{"name":"2013 IEEE 15th Conference on Business Informatics","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite the fact that integrated approaches for Corporate Governance, Risk and Compliance Management (GRC-Management) are increasingly demanded, GRC is still used as a catchword for a wide range of topics whereas it is to a large extend unclear how the area of topics could be structured and which needs of research exist. Therefore this article analyses the state of research on the basis of strategic GRC-Management requirements and develops a structured research agenda.
{"title":"Towards a Research Agenda for Strategic Governance, Risk and Compliance (GRC) Management","authors":"V. Nissen, Wolfgang Marekfia","doi":"10.1109/CBI.2013.9","DOIUrl":"https://doi.org/10.1109/CBI.2013.9","url":null,"abstract":"Despite the fact that integrated approaches for Corporate Governance, Risk and Compliance Management (GRC-Management) are increasingly demanded, GRC is still used as a catchword for a wide range of topics whereas it is to a large extend unclear how the area of topics could be structured and which needs of research exist. Therefore this article analyses the state of research on the basis of strategic GRC-Management requirements and develops a structured research agenda.","PeriodicalId":443410,"journal":{"name":"2013 IEEE 15th Conference on Business Informatics","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor/actuator networks (WSNs) are hard to program, in particular so for business domain experts that have a good understanding of how WSNs can best be used to improve business operations. This contributes to hampering WSN adoption by enterprises. As business process modeling languages such as the Business Process Model and Notation (BPMN) are well accessible to domain experts, they can be used as a tool to facilitate WSN programming. In this paper, we explore the properties of WSNs that set them apart from traditional IT systems and use these properties to derive requirements for BPMN extensions that are tailored to the specifics of WSNs. We furthermore propose a set of BPMN extensions that fulfill these requirements and demonstrate that they are better suited for modeling WSN processes than standard BPMN.
{"title":"Extending BPMN for Wireless Sensor Networks","authors":"C. Sungur, P. Spiess, N. Oertel, Oliver Kopp","doi":"10.1109/CBI.2013.24","DOIUrl":"https://doi.org/10.1109/CBI.2013.24","url":null,"abstract":"Wireless sensor/actuator networks (WSNs) are hard to program, in particular so for business domain experts that have a good understanding of how WSNs can best be used to improve business operations. This contributes to hampering WSN adoption by enterprises. As business process modeling languages such as the Business Process Model and Notation (BPMN) are well accessible to domain experts, they can be used as a tool to facilitate WSN programming. In this paper, we explore the properties of WSNs that set them apart from traditional IT systems and use these properties to derive requirements for BPMN extensions that are tailored to the specifics of WSNs. We furthermore propose a set of BPMN extensions that fulfill these requirements and demonstrate that they are better suited for modeling WSN processes than standard BPMN.","PeriodicalId":443410,"journal":{"name":"2013 IEEE 15th Conference on Business Informatics","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133646705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the course of a research project funded by the Austrian Research Promotion Agency (FFG), we integrate cognitive engineering in the field of requirements management. In doing so, we go in the question of how utility and quality of design components could be operationalized in the context of modeling at the design phase in a software development project. We named this project Traceability Controlling (TraCo). Our focus in TraCo is on the quality assurance of the modelers' design decisions made at the phase of problem-solving and solution specification. For the purpose of implementing TraCo we choose an interdisciplinary approach. We present an appropriate method to ensure the level of quality of the created design solution already during its creation. The TraCo-method can be used for continuously monitoring and controlling content quality issues like adequacy, appropriateness, and impact. By using the introduced method, system architects and modelers are able to validate whether the design model or fine-grained the model's design components exist in sufficient quality and whether these components meet the predetermined requirements' prioritization (i.e. their stakeholder values).
在奥地利研究促进机构(FFG)资助的一个研究项目的过程中,我们将认知工程集成到需求管理领域。在这样做的过程中,我们进入了设计组件的效用和质量如何在软件开发项目的设计阶段建模的上下文中进行操作的问题。我们将这个项目命名为Traceability control (TraCo)。我们在TraCo中的重点是在问题解决和解决方案规范阶段建模者的设计决策的质量保证。为了实现TraCo,我们选择了一种跨学科的方法。我们提出了一种适当的方法,以确保所创建的设计解决方案的质量水平已经在其创建。traco方法可用于持续监测和控制内容质量问题,如充分性、适当性和影响。通过使用所介绍的方法,系统架构师和建模师能够验证设计模型或细粒度模型的设计组件是否以足够的质量存在,以及这些组件是否满足预定需求的优先级(即它们的涉众值)。
{"title":"Context-Sensitive Traceability Controlling","authors":"Alexandra Mazak, H. Kargl","doi":"10.1109/CBI.2013.50","DOIUrl":"https://doi.org/10.1109/CBI.2013.50","url":null,"abstract":"In the course of a research project funded by the Austrian Research Promotion Agency (FFG), we integrate cognitive engineering in the field of requirements management. In doing so, we go in the question of how utility and quality of design components could be operationalized in the context of modeling at the design phase in a software development project. We named this project Traceability Controlling (TraCo). Our focus in TraCo is on the quality assurance of the modelers' design decisions made at the phase of problem-solving and solution specification. For the purpose of implementing TraCo we choose an interdisciplinary approach. We present an appropriate method to ensure the level of quality of the created design solution already during its creation. The TraCo-method can be used for continuously monitoring and controlling content quality issues like adequacy, appropriateness, and impact. By using the introduced method, system architects and modelers are able to validate whether the design model or fine-grained the model's design components exist in sufficient quality and whether these components meet the predetermined requirements' prioritization (i.e. their stakeholder values).","PeriodicalId":443410,"journal":{"name":"2013 IEEE 15th Conference on Business Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114862281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}