首页 > 最新文献

Business & Information Systems Engineering最新文献

英文 中文
Open Science 开放科学
IF 7.9 3区 管理学 Q1 Computer Science Pub Date : 2024-03-05 DOI: 10.1007/s12599-024-00858-7
Alexander Maedche, Edona Elshan, Hartmut Höhle, Christiane Lehrer, Jan Recker, Ali Sunyaev, Benjamin Sturm, Oliver Werth
{"title":"Open Science","authors":"Alexander Maedche, Edona Elshan, Hartmut Höhle, Christiane Lehrer, Jan Recker, Ali Sunyaev, Benjamin Sturm, Oliver Werth","doi":"10.1007/s12599-024-00858-7","DOIUrl":"https://doi.org/10.1007/s12599-024-00858-7","url":null,"abstract":"","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"71 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140037505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Seamless Mobility-as-a-Service 实现无缝移动即服务
IF 7.9 3区 管理学 Q1 Computer Science Pub Date : 2024-02-19 DOI: 10.1007/s12599-024-00856-9
Alexandra Hoess, Jonathan Lautenschlager, Johannes Sedlmeir, Gilbert Fridgen, Vincent Schlatt, Nils Urbach

With growing awareness of sustainability and convenience expectations, customers are increasingly demanding integrated and seamless mobility in the form of mobility-as-a-service (MaaS). However, as centralized MaaS platforms have thus far failed to integrate a critical share of mobility service providers (MSPs), travelers lack opportunities to efficiently combine the various mobility services required for seamless end-to-end itinerary coverage. Particularly, MSPs often refuse to collaborate by devolving control over customer interfaces or sensitive data owing to threats of market power concentration. While alternative blockchain-based approaches aim to provide equal market access, they cannot sufficiently align competing business goals and face substantial problems resulting from the replicated processing of sensitive data. Both researchers and practitioners have recently suggested decentralized digital identity management enabled by digital wallets as a promising mechanism to exchange verifiable identity attributes while mitigating problems related to data aggregation. Following a design science research approach, the article accordingly explores how digital wallets can address the shortcomings of existing approaches to MaaS. It contributes a novel IS architecture and principles for a design at the nexus of centralized and decentralized solutions to mitigate tensions between cooperation and competition. Further, the findings indicate that when building decentralized solutions, one should also consider components beyond blockchain and smart contracts.

随着人们对可持续发展和便利性的期望越来越高,客户对移动即服务(MaaS)形式的综合无缝移动服务的需求也越来越大。然而,由于集中式 MaaS 平台迄今未能整合移动服务提供商(MSP)的重要份额,旅行者缺乏有效组合各种移动服务的机会,无法实现无缝的端到端行程覆盖。特别是,由于市场力量集中的威胁,MSP 经常拒绝通过下放对客户界面或敏感数据的控制权来开展合作。虽然基于区块链的替代方法旨在提供平等的市场准入,但它们无法充分协调相互竞争的业务目标,并面临着因重复处理敏感数据而产生的重大问题。最近,研究人员和从业人员都建议,由数字钱包支持的去中心化数字身份管理是一种很有前途的机制,既能交换可验证的身份属性,又能缓解与数据聚合相关的问题。文章采用设计科学研究方法,相应地探讨了数字钱包如何解决现有 MaaS 方法的不足。文章提出了一种新颖的基础设施服务架构,以及集中式和分散式解决方案之间的设计原则,以缓解合作与竞争之间的紧张关系。此外,研究结果表明,在构建去中心化解决方案时,还应考虑区块链和智能合约之外的其他组成部分。
{"title":"Toward Seamless Mobility-as-a-Service","authors":"Alexandra Hoess, Jonathan Lautenschlager, Johannes Sedlmeir, Gilbert Fridgen, Vincent Schlatt, Nils Urbach","doi":"10.1007/s12599-024-00856-9","DOIUrl":"https://doi.org/10.1007/s12599-024-00856-9","url":null,"abstract":"<p>With growing awareness of sustainability and convenience expectations, customers are increasingly demanding integrated and seamless mobility in the form of mobility-as-a-service (MaaS). However, as centralized MaaS platforms have thus far failed to integrate a critical share of mobility service providers (MSPs), travelers lack opportunities to efficiently combine the various mobility services required for seamless end-to-end itinerary coverage. Particularly, MSPs often refuse to collaborate by devolving control over customer interfaces or sensitive data owing to threats of market power concentration. While alternative blockchain-based approaches aim to provide equal market access, they cannot sufficiently align competing business goals and face substantial problems resulting from the replicated processing of sensitive data. Both researchers and practitioners have recently suggested decentralized digital identity management enabled by digital wallets as a promising mechanism to exchange verifiable identity attributes while mitigating problems related to data aggregation. Following a design science research approach, the article accordingly explores how digital wallets can address the shortcomings of existing approaches to MaaS. It contributes a novel IS architecture and principles for a design at the nexus of centralized and decentralized solutions to mitigate tensions between cooperation and competition. Further, the findings indicate that when building decentralized solutions, one should also consider components beyond blockchain and smart contracts.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"6 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139923080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hedonic Signals in Crowdfunding 众筹中的对价信号
IF 7.9 3区 管理学 Q1 Computer Science Pub Date : 2024-02-12 DOI: 10.1007/s12599-024-00854-x
Ivo Blohm, Moritz Schulz, Jan Marco Leimeister

This study draws on signaling theory to investigate the effect of hedonic signals in crowdfunding projects on funding performance. It compares the effect of hedonic signals across reward-, equity-, and donation-based crowdfunding platforms by combining archival data from 18 platforms and a large-scale panel of 64 experts that rate the strength of hedonic signals in 108 crowdfunding projects. Through the application of mixed linear modeling, the findings indicate a positive influence of stronger hedonic signals on funding performance. However, there are substantial differences across platform types. Increasing the strength of hedonic signals by one standard deviation increases funding performance by 28.9% on reward platforms, while there are no systematic effects on equity and donation platforms. This study contributes to existing crowdfunding research by clarifying the role of hedonic signals in crowdfunding and shedding light on the increasing need to better consider the characteristics of different crowdfunding platforms in crowdfunding research.

本研究借鉴信号理论,研究众筹项目中的享乐信号对筹资绩效的影响。它结合了来自 18 个平台的档案数据和一个由 64 位专家组成的大型小组,对 108 个众筹项目中的享乐主义信号的强度进行了评级,从而比较了享乐主义信号在基于奖励、股权和捐赠的众筹平台中的影响。通过应用混合线性建模,研究结果表明,较强的享乐主义信号对筹资绩效有积极影响。然而,不同类型的平台之间存在很大差异。将享乐主义信号的强度提高一个标准差,奖励平台的筹资绩效就会提高 28.9%,而股权和捐赠平台则没有系统性的影响。本研究阐明了享乐主义信号在众筹中的作用,并揭示了在众筹研究中更好地考虑不同众筹平台特点的日益必要性,从而为现有的众筹研究做出了贡献。
{"title":"Hedonic Signals in Crowdfunding","authors":"Ivo Blohm, Moritz Schulz, Jan Marco Leimeister","doi":"10.1007/s12599-024-00854-x","DOIUrl":"https://doi.org/10.1007/s12599-024-00854-x","url":null,"abstract":"<p>This study draws on signaling theory to investigate the effect of hedonic signals in crowdfunding projects on funding performance. It compares the effect of hedonic signals across reward-, equity-, and donation-based crowdfunding platforms by combining archival data from 18 platforms and a large-scale panel of 64 experts that rate the strength of hedonic signals in 108 crowdfunding projects. Through the application of mixed linear modeling, the findings indicate a positive influence of stronger hedonic signals on funding performance. However, there are substantial differences across platform types. Increasing the strength of hedonic signals by one standard deviation increases funding performance by 28.9% on reward platforms, while there are no systematic effects on equity and donation platforms. This study contributes to existing crowdfunding research by clarifying the role of hedonic signals in crowdfunding and shedding light on the increasing need to better consider the characteristics of different crowdfunding platforms in crowdfunding research.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"48 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139753700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing Game-based Learning Artefacts for Cybersecurity Processes Using Action Design Research 利用行动设计研究为网络安全流程设计基于游戏的学习工件
IF 7.9 3区 管理学 Q1 Computer Science Pub Date : 2024-02-12 DOI: 10.1007/s12599-024-00852-z
Dixon Prem Daniel Rajendran, Rangaraja P. Sundarraj

Cybersecurity threats faced by organizations are growing in volume and sophistication, with human issues being a significant reason underlying these threats. Organizations report the need for skills development to face these challenges. This need is addressed in this study by developing game-based learning (GBL) artefacts for process-related cybersecurity issues. The artefacts are developed using ADR (Action Design Research). These artefacts employ procedures prescribed by NIST (National Institute of Standards and Technology) and CCMP (Cyber Crisis Management Plan) to teach users cybersecurity concepts such as cyber crisis management, malware incident forensics, incident handling and password management. The paper details the artefacts and design process, highlights the implications for practitioners and academicians in GBL, and also describes a nascent theory for Design Science Research (DSR).

各组织面临的网络安全威胁在数量和复杂程度上都在不断增加,而人为问题是造成这些威胁的一个重要原因。各组织都表示需要开发技能来应对这些挑战。本研究通过针对与流程相关的网络安全问题开发基于游戏的学习(GBL)工具来满足这一需求。这些人工制品是通过 ADR(行动设计研究)开发的。这些工件采用 NIST(美国国家标准与技术研究院)和 CCMP(网络危机管理计划)规定的程序,向用户传授网络危机管理、恶意软件事件取证、事件处理和密码管理等网络安全概念。论文详细介绍了人工制品和设计过程,强调了对 GBL 从业人员和学术界的影响,还描述了设计科学研究(DSR)的新生理论。
{"title":"Designing Game-based Learning Artefacts for Cybersecurity Processes Using Action Design Research","authors":"Dixon Prem Daniel Rajendran, Rangaraja P. Sundarraj","doi":"10.1007/s12599-024-00852-z","DOIUrl":"https://doi.org/10.1007/s12599-024-00852-z","url":null,"abstract":"<p>Cybersecurity threats faced by organizations are growing in volume and sophistication, with human issues being a significant reason underlying these threats. Organizations report the need for skills development to face these challenges. This need is addressed in this study by developing game-based learning (GBL) artefacts for process-related cybersecurity issues. The artefacts are developed using ADR (Action Design Research). These artefacts employ procedures prescribed by NIST (National Institute of Standards and Technology) and CCMP (Cyber Crisis Management Plan) to teach users cybersecurity concepts such as cyber crisis management, malware incident forensics, incident handling and password management. The paper details the artefacts and design process, highlights the implications for practitioners and academicians in GBL, and also describes a nascent theory for Design Science Research (DSR).</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"51 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139753970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Expert-Validated Bridging Model for IoT Process Mining 经专家验证的物联网流程挖掘桥接模型
IF 7.9 3区 管理学 Q1 Computer Science Pub Date : 2024-02-08 DOI: 10.1007/s12599-023-00849-0

Abstract

Contextualization is an important challenge in process mining. While Internet of Things (IoT) devices are collecting increasing amounts of data on the physical context in which business processes are executed, the IoT and process mining fields are still considerably disintegrated. Important concepts such as event or context are not understood in the same way, which causes confusion and hinders cooperation between the two domains. Accordingly, in the paper, a consolidated model to bridge the conceptualization gap between the IoT and process mining fields, based on IoT ontologies and business process context models, is presented. This consolidation based on an initial model was obtained after an extensive validation both with an expert panel and with case studies. The results of the expert survey show that the model properly describes the links between the IoT and process mining and that it has added value for IoT process mining. Furthermore, the model was refined according to the experts’ feedback. Accordingly, the paper’s key contribution consists of a common reference model that can instigate true interdisciplinary research connecting IoT and process mining.

摘要 情境化是流程挖掘的一个重要挑战。虽然物联网(IoT)设备正在收集越来越多的有关业务流程执行时的物理环境的数据,但物联网和流程挖掘领域仍然存在很大的隔阂。人们对事件或上下文等重要概念的理解不尽相同,这造成了混淆,阻碍了两个领域的合作。因此,本文基于物联网本体和业务流程上下文模型,提出了一个综合模型,以弥合物联网和流程挖掘领域之间的概念化差距。这一基于初始模型的整合模型是在经过专家小组和案例研究的广泛验证后获得的。专家调查结果表明,该模型恰当地描述了物联网与流程挖掘之间的联系,并为物联网流程挖掘提供了附加值。此外,该模型还根据专家的反馈意见进行了改进。因此,本文的主要贡献在于提供了一个通用参考模型,该模型可促进将物联网与流程挖掘联系起来的真正的跨学科研究。
{"title":"An Expert-Validated Bridging Model for IoT Process Mining","authors":"","doi":"10.1007/s12599-023-00849-0","DOIUrl":"https://doi.org/10.1007/s12599-023-00849-0","url":null,"abstract":"<h3>Abstract</h3> <p>Contextualization is an important challenge in process mining. While Internet of Things (IoT) devices are collecting increasing amounts of data on the physical context in which business processes are executed, the IoT and process mining fields are still considerably disintegrated. Important concepts such as <em>event</em> or <em>context</em> are not understood in the same way, which causes confusion and hinders cooperation between the two domains. Accordingly, in the paper, a consolidated model to bridge the conceptualization gap between the IoT and process mining fields, based on IoT ontologies and business process context models, is presented. This consolidation based on an initial model was obtained after an extensive validation both with an expert panel and with case studies. The results of the expert survey show that the model properly describes the links between the IoT and process mining and that it has added value for IoT process mining. Furthermore, the model was refined according to the experts’ feedback. Accordingly, the paper’s key contribution consists of a common reference model that can instigate true interdisciplinary research connecting IoT and process mining.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"11 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139753791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Putting the SWORD to the Test: Finding Workarounds with Process Mining 测试 SWORD:利用流程挖掘寻找变通方法
IF 7.9 3区 管理学 Q1 Computer Science Pub Date : 2024-01-29 DOI: 10.1007/s12599-023-00846-3
Wouter van der Waal, Inge van de Weerd, Iris Beerepoot, Xixi Lu, Teus Kappen, Saskia Haitjema, Hajo A. Reijers

Workarounds, or deviations from standardized operating procedures, can indicate discrepancies between theory and practice in work processes. Traditionally, observations and interviews have been used to identify workarounds, but these methods can be time-consuming and may not capture all workarounds. The paper presents the Semi-automated WORkaround Detection (SWORD) framework, which leverages event log traces to help process analysts identify workarounds. The framework is evaluated in a multiple-case study of two hospital departments. The results of the study indicate that with SWORD we were able to identify 11 unique workaround types, with limited knowledge about the actual processes. The framework thus supports the discovery of workarounds while minimizing the dependence on domain knowledge, which limits the time investment required by domain experts. The findings highlight the importance of leveraging technology to improve the detection of workarounds and to support process improvement efforts in organizations.

变通方法或标准化操作程序的偏差,可表明工作流程中理论与实践之间的差异。传统上,人们使用观察和访谈来识别变通方法,但这些方法可能很耗时,而且可能无法捕捉到所有变通方法。本文介绍了半自动变通方法检测(SWORD)框架,该框架利用事件日志跟踪来帮助流程分析人员识别变通方法。该框架通过对两个医院科室的多案例研究进行了评估。研究结果表明,利用 SWORD,我们能够在对实际流程了解有限的情况下,识别出 11 种独特的变通方法。因此,该框架在支持发现变通方法的同时,最大限度地减少了对领域知识的依赖,从而限制了领域专家所需的时间投入。研究结果凸显了利用技术改进变通方法检测和支持组织流程改进工作的重要性。
{"title":"Putting the SWORD to the Test: Finding Workarounds with Process Mining","authors":"Wouter van der Waal, Inge van de Weerd, Iris Beerepoot, Xixi Lu, Teus Kappen, Saskia Haitjema, Hajo A. Reijers","doi":"10.1007/s12599-023-00846-3","DOIUrl":"https://doi.org/10.1007/s12599-023-00846-3","url":null,"abstract":"<p>Workarounds, or deviations from standardized operating procedures, can indicate discrepancies between theory and practice in work processes. Traditionally, observations and interviews have been used to identify workarounds, but these methods can be time-consuming and may not capture all workarounds. The paper presents the Semi-automated WORkaround Detection (SWORD) framework, which leverages event log traces to help process analysts identify workarounds. The framework is evaluated in a multiple-case study of two hospital departments. The results of the study indicate that with SWORD we were able to identify 11 unique workaround types, with limited knowledge about the actual processes. The framework thus supports the discovery of workarounds while minimizing the dependence on domain knowledge, which limits the time investment required by domain experts. The findings highlight the importance of leveraging technology to improve the detection of workarounds and to support process improvement efforts in organizations.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"2 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139587329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Foundation Models 基础模型
IF 7.9 3区 管理学 Q1 Computer Science Pub Date : 2024-01-29 DOI: 10.1007/s12599-024-00851-0
Johannes Schneider, Christian Meske, Pauline Kuss
{"title":"Foundation Models","authors":"Johannes Schneider, Christian Meske, Pauline Kuss","doi":"10.1007/s12599-024-00851-0","DOIUrl":"https://doi.org/10.1007/s12599-024-00851-0","url":null,"abstract":"","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"167 2","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139579550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating BPMN Extensions for Continuous Processes Based on Use Cases and Expert Interviews 基于用例和专家访谈评估用于持续流程的 BPMN 扩展
IF 7.9 3区 管理学 Q1 Computer Science Pub Date : 2024-01-29 DOI: 10.1007/s12599-023-00850-7
Diana Strutzenberger, Juergen Mangler, Stefanie Rinderle-Ma

The majority of (business) processes described in literature are discrete, i.e., they result in an identifiable and distinct outcome such as a settled customer claim or a produced part. However, there also exists a plethora of processes in process and control engineering that are continuous, i.e., processes that require real-time control systems with constant inlet and outlet flows as well as temporally stable conditions. Examples comprise chemical synthesis and combustion processes. Despite their prevalence and relevance a standard method for modeling continuous processes with BPMN is missing. Hence, the paper provides BPMN modeling extensions for continuous processes enabling an exact definition of the parameters and loop conditions as well as a mapping to executable processes. The BPMN modeling extensions are evaluated based on selected use cases from process and control engineering and interviews with experts from three groups, i.e., process engineers and two groups of process modelers, one with experience in industrial processes and one without. The results from the expert interviews are intended to identify (i) the key characteristics for the representation of continuous processes, (ii) how experts evaluate the current usability and comprehensibility of BPMN for continuous processes, and (iii) potential improvements can be identified regarding the introduced BPMN modeling extensions.

文献中描述的大多数(业务)流程都是离散的,即它们会产生可识别的独特结果,如解决客户索赔或生产部件。然而,流程和控制工程中也存在大量的连续流程,即需要实时控制系统、恒定的入口和出口流量以及时间上稳定的条件的流程。例如化学合成和燃烧过程。尽管这些过程非常普遍,而且与我们的生活息息相关,但目前还缺少一种用 BPMN 对连续过程进行建模的标准方法。因此,本文为连续过程提供了 BPMN 建模扩展,从而能够准确定义参数和循环条件,并映射到可执行过程。BPMN 建模扩展的评估基于流程和控制工程中的选定用例,以及对三组专家的访谈,即流程工程师和两组流程建模人员,一组具有工业流程经验,另一组没有。专家访谈的结果旨在确定:(i) 连续过程表示法的关键特征;(ii) 专家如何评价连续过程 BPMN 目前的可用性和可理解性;(iii) 可以确定引入的 BPMN 建模扩展的潜在改进之处。
{"title":"Evaluating BPMN Extensions for Continuous Processes Based on Use Cases and Expert Interviews","authors":"Diana Strutzenberger, Juergen Mangler, Stefanie Rinderle-Ma","doi":"10.1007/s12599-023-00850-7","DOIUrl":"https://doi.org/10.1007/s12599-023-00850-7","url":null,"abstract":"<p>The majority of (business) processes described in literature are discrete, i.e., they result in an identifiable and distinct outcome such as a settled customer claim or a produced part. However, there also exists a plethora of processes in process and control engineering that are continuous, i.e., processes that require real-time control systems with constant inlet and outlet flows as well as temporally stable conditions. Examples comprise chemical synthesis and combustion processes. Despite their prevalence and relevance a standard method for modeling continuous processes with BPMN is missing. Hence, the paper provides BPMN modeling extensions for continuous processes enabling an exact definition of the parameters and loop conditions as well as a mapping to executable processes. The BPMN modeling extensions are evaluated based on selected use cases from process and control engineering and interviews with experts from three groups, i.e., process engineers and two groups of process modelers, one with experience in industrial processes and one without. The results from the expert interviews are intended to identify (i) the key characteristics for the representation of continuous processes, (ii) how experts evaluate the current usability and comprehensibility of BPMN for continuous processes, and (iii) potential improvements can be identified regarding the introduced BPMN modeling extensions.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"153 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139587330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Twin Transformation Butterfly 双胞胎变身蝴蝶
IF 7.9 3区 管理学 Q1 Computer Science Pub Date : 2024-01-23 DOI: 10.1007/s12599-023-00847-2

Abstract

Complex digitalization and sustainability challenges shape today’s management agendas. To date, the dedication of Information Systems research to both challenges has not been equal in terms of effort and reward. Building capabilities to leverage the synergetic potential of digital and sustainability transformation may enhance organizational performance and imply new value creation for the common good. To uncover such synergetic potential, this work conceptualizes the “twin transformation” construct as a value-adding reinforcing interplay between digital transformation and sustainability transformation efforts that improve an organization by leveraging digital technologies to enable sustainability and to guide digital progress by leveraging sustainability. The twin transformation conceptualization is complemented with a capability framework for twin transformation drawing from dynamic capability theory. This work contributes to descriptive knowledge of the interplay between digital transformation and sustainability transformation, setting a foundation for further theorizing on twin transformation and enabling organizations to twin transform.

摘要 复杂的数字化和可持续性挑战决定了当今的管理议程。迄今为止,信息系统研究在应对这两项挑战方面所付出的努力和收获并不对等。建设利用数字化和可持续发展转型的协同潜力的能力,可以提高组织绩效,并意味着为共同利益创造新的价值。为了发掘这种协同潜力,本研究将 "双转型 "概念化为数字化转型与可持续发展转型之间的增值强化相互作用,通过利用数字化技术改善组织,实现可持续发展,并通过利用可持续发展引导数字化进步。孪生转型概念化与借鉴动态能力理论的孪生转型能力框架相辅相成。这项工作有助于描述数字化转型与可持续发展转型之间的相互作用,为孪生转型的进一步理论化奠定基础,并使组织能够实现孪生转型。
{"title":"The Twin Transformation Butterfly","authors":"","doi":"10.1007/s12599-023-00847-2","DOIUrl":"https://doi.org/10.1007/s12599-023-00847-2","url":null,"abstract":"<h3>Abstract</h3> <p>Complex digitalization and sustainability challenges shape today’s management agendas. To date, the dedication of Information Systems research to both challenges has not been equal in terms of effort and reward. Building capabilities to leverage the synergetic potential of digital and sustainability transformation may enhance organizational performance and imply new value creation for the common good. To uncover such synergetic potential, this work conceptualizes the “twin transformation” construct as a value-adding reinforcing interplay between digital transformation and sustainability transformation efforts that improve an organization by leveraging digital technologies to enable sustainability and to guide digital progress by leveraging sustainability. The twin transformation conceptualization is complemented with a capability framework for twin transformation drawing from dynamic capability theory. This work contributes to descriptive knowledge of the interplay between digital transformation and sustainability transformation, setting a foundation for further theorizing on twin transformation and enabling organizations to twin transform.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"24 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139552477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Behavior Mining 用户行为挖掘
IF 7.9 3区 管理学 Q1 Computer Science Pub Date : 2024-01-05 DOI: 10.1007/s12599-023-00848-1
Jana-Rebecca Rehse, Luka Abb, Gregor Berg, Carsten Bormann, Timotheus Kampik, Christian Warmuth

Studying the behavior of users in software systems has become an essential task for software vendors who want to mitigate usability problems and identify automation potentials, or for researchers who want to test behavioral theories. One approach to studying user behavior in a data-driven way is through the analysis of so-called user interaction (UI) logs, which record the low-level activities that a user performs while executing a task. In the paper, the authors refer to the analysis of UI logs as User Behavior Mining (UBM) and position it as a research topic. UBM is conceptualized by means of a four-component framework that elaborates how UBM data can be captured, which technologies can be applied to analyze it, which objectives UBM can accomplish, and how theories can guide the analytical process. The applicability of the framework is demonstrated by three exemplary applications from an ongoing research project with a partner company. Finally, the paper discusses practical challenges to UBM and derives an agenda for potential future research directions.

研究用户在软件系统中的行为已成为软件供应商或研究人员的一项重要任务,前者希望减少可用性问题并识别自动化潜力,后者则希望测试行为理论。以数据驱动的方式研究用户行为的一种方法是分析所谓的用户交互(UI)日志,这些日志记录了用户在执行任务时的低级活动。在本文中,作者将用户交互日志分析称为用户行为挖掘(UBM),并将其定位为一个研究课题。作者通过一个由四个部分组成的框架对 UBM 进行了概念化,详细阐述了如何获取 UBM 数据、应用哪些技术对其进行分析、UBM 可以实现哪些目标以及如何用理论指导分析过程。该框架的适用性通过与一家合作公司正在进行的研究项目中的三个示例应用进行了论证。最后,本文讨论了用户至上管理面临的实际挑战,并为潜在的未来研究方向提出了一个议程。
{"title":"User Behavior Mining","authors":"Jana-Rebecca Rehse, Luka Abb, Gregor Berg, Carsten Bormann, Timotheus Kampik, Christian Warmuth","doi":"10.1007/s12599-023-00848-1","DOIUrl":"https://doi.org/10.1007/s12599-023-00848-1","url":null,"abstract":"<p>Studying the behavior of users in software systems has become an essential task for software vendors who want to mitigate usability problems and identify automation potentials, or for researchers who want to test behavioral theories. One approach to studying user behavior in a data-driven way is through the analysis of so-called user interaction (UI) logs, which record the low-level activities that a user performs while executing a task. In the paper, the authors refer to the analysis of UI logs as User Behavior Mining (UBM) and position it as a research topic. UBM is conceptualized by means of a four-component framework that elaborates how UBM data can be captured, which technologies can be applied to analyze it, which objectives UBM can accomplish, and how theories can guide the analytical process. The applicability of the framework is demonstrated by three exemplary applications from an ongoing research project with a partner company. Finally, the paper discusses practical challenges to UBM and derives an agenda for potential future research directions.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"11 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139102378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Business & Information Systems Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1