Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2022
|
Ausgabe: | 1st ed |
Schriftenreihe: | Lecture Notes in Business Information Processing Series
v.450 |
Schlagworte: | |
Online-Zugang: | HWR01 |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV049019538 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 230626s2022 |||| o||u| ||||||eng d | ||
020 | |a 9783031074752 |9 978-3-031-07475-2 | ||
035 | |a (ZDB-30-PQE)EBC7001655 | ||
035 | |a (ZDB-30-PAD)EBC7001655 | ||
035 | |a (ZDB-89-EBL)EBL7001655 | ||
035 | |a (OCoLC)1322834834 | ||
035 | |a (DE-599)BVBBV049019538 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 658.05 | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
100 | 1 | |a Augusto, Adriano |e Verfasser |4 aut | |
245 | 1 | 0 | |a Enterprise, Business-Process and Information Systems Modeling |b 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings |
250 | |a 1st ed | ||
264 | 1 | |a Cham |b Springer International Publishing AG |c 2022 | |
264 | 4 | |c ©2022 | |
300 | |a 1 Online-Ressource (362 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes in Business Information Processing Series |v v.450 | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References | |
505 | 8 | |a A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining | |
505 | 8 | |a 5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning | |
505 | 8 | |a 4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction | |
505 | 8 | |a 2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules | |
505 | 8 | |a 3 Implementation and Evaluation | |
650 | 4 | |a Business-Data processing | |
650 | 4 | |a Industrial management | |
650 | 4 | |a Management information systems-Congresses | |
650 | 0 | 7 | |a Prozessmanagement |0 (DE-588)4353072-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsmodellierung |0 (DE-588)4214293-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2022 |z Löwen |2 gnd-content | |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Informationsmodellierung |0 (DE-588)4214293-3 |D s |
689 | 0 | 2 | |a Prozessmanagement |0 (DE-588)4353072-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Gill, Asif |e Sonstige |4 oth | |
700 | 1 | |a Bork, Dominik |e Sonstige |4 oth | |
700 | 1 | |a Nurcan, Selmin |e Sonstige |4 oth | |
700 | 1 | |a Reinhartz-Berger, Iris |e Sonstige |4 oth | |
700 | 1 | |a Schmidt, Rainer |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Augusto, Adriano |t Enterprise, Business-Process and Information Systems Modeling |d Cham : Springer International Publishing AG,c2022 |z 9783031074745 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034282445 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7001655 |l HWR01 |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804185295714779136 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Augusto, Adriano |
author_facet | Augusto, Adriano |
author_role | aut |
author_sort | Augusto, Adriano |
author_variant | a a aa |
building | Verbundindex |
bvnumber | BV049019538 |
classification_rvk | QP 345 |
collection | ZDB-30-PQE |
contents | Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining 5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning 4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction 2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules 3 Implementation and Evaluation |
ctrlnum | (ZDB-30-PQE)EBC7001655 (ZDB-30-PAD)EBC7001655 (ZDB-89-EBL)EBL7001655 (OCoLC)1322834834 (DE-599)BVBBV049019538 |
dewey-full | 658.05 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.05 |
dewey-search | 658.05 |
dewey-sort | 3658.05 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>12032nmm a2200661zcb4500</leader><controlfield tag="001">BV049019538</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230626s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031074752</subfield><subfield code="9">978-3-031-07475-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC7001655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC7001655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL7001655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1322834834</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049019538</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.05</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Augusto, Adriano</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise, Business-Process and Information Systems Modeling</subfield><subfield code="b">23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (362 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes in Business Information Processing Series</subfield><subfield code="v">v.450</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3 Implementation and Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business-Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems-Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prozessmanagement</subfield><subfield code="0">(DE-588)4353072-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsmodellierung</subfield><subfield code="0">(DE-588)4214293-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2022</subfield><subfield code="z">Löwen</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationsmodellierung</subfield><subfield code="0">(DE-588)4214293-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Prozessmanagement</subfield><subfield code="0">(DE-588)4353072-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gill, Asif</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bork, Dominik</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nurcan, Selmin</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reinhartz-Berger, Iris</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schmidt, Rainer</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Augusto, Adriano</subfield><subfield code="t">Enterprise, Business-Process and Information Systems Modeling</subfield><subfield code="d">Cham : Springer International Publishing AG,c2022</subfield><subfield code="z">9783031074745</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034282445</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7001655</subfield><subfield code="l">HWR01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2022 Löwen gnd-content |
genre_facet | Konferenzschrift 2022 Löwen |
id | DE-604.BV049019538 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:13:39Z |
indexdate | 2024-07-10T09:52:58Z |
institution | BVB |
isbn | 9783031074752 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034282445 |
oclc_num | 1322834834 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 Online-Ressource (362 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer International Publishing AG |
record_format | marc |
series2 | Lecture Notes in Business Information Processing Series |
spelling | Augusto, Adriano Verfasser aut Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings 1st ed Cham Springer International Publishing AG 2022 ©2022 1 Online-Ressource (362 Seiten) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Business Information Processing Series v.450 Description based on publisher supplied metadata and other sources Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining 5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning 4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction 2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules 3 Implementation and Evaluation Business-Data processing Industrial management Management information systems-Congresses Prozessmanagement (DE-588)4353072-2 gnd rswk-swf Informationsmodellierung (DE-588)4214293-3 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2022 Löwen gnd-content Unternehmen (DE-588)4061963-1 s Informationsmodellierung (DE-588)4214293-3 s Prozessmanagement (DE-588)4353072-2 s DE-604 Gill, Asif Sonstige oth Bork, Dominik Sonstige oth Nurcan, Selmin Sonstige oth Reinhartz-Berger, Iris Sonstige oth Schmidt, Rainer Sonstige oth Erscheint auch als Druck-Ausgabe Augusto, Adriano Enterprise, Business-Process and Information Systems Modeling Cham : Springer International Publishing AG,c2022 9783031074745 |
spellingShingle | Augusto, Adriano Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining 5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning 4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction 2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules 3 Implementation and Evaluation Business-Data processing Industrial management Management information systems-Congresses Prozessmanagement (DE-588)4353072-2 gnd Informationsmodellierung (DE-588)4214293-3 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4353072-2 (DE-588)4214293-3 (DE-588)4061963-1 (DE-588)1071861417 |
title | Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings |
title_auth | Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings |
title_exact_search | Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings |
title_exact_search_txtP | Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings |
title_full | Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings |
title_fullStr | Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings |
title_full_unstemmed | Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings |
title_short | Enterprise, Business-Process and Information Systems Modeling |
title_sort | enterprise business process and information systems modeling 23rd international conference bpmds 2022 and 27th international conference emmsad 2022 held at caise 2022 leuven belgium june 6 7 2022 proceedings |
title_sub | 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings |
topic | Business-Data processing Industrial management Management information systems-Congresses Prozessmanagement (DE-588)4353072-2 gnd Informationsmodellierung (DE-588)4214293-3 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | Business-Data processing Industrial management Management information systems-Congresses Prozessmanagement Informationsmodellierung Unternehmen Konferenzschrift 2022 Löwen |
work_keys_str_mv | AT augustoadriano enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings AT gillasif enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings AT borkdominik enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings AT nurcanselmin enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings AT reinhartzbergeriris enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings AT schmidtrainer enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings |