Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Augusto, Adriano (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Cham Springer International Publishing AG 2022
Ausgabe:1st ed
Schriftenreihe:Lecture Notes in Business Information Processing Series v.450
Schlagworte:
Online-Zugang:HWR01
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zcb4500
001 BV049019538
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 230626s2022 |||| o||u| ||||||eng d
020 |a 9783031074752  |9 978-3-031-07475-2 
035 |a (ZDB-30-PQE)EBC7001655 
035 |a (ZDB-30-PAD)EBC7001655 
035 |a (ZDB-89-EBL)EBL7001655 
035 |a (OCoLC)1322834834 
035 |a (DE-599)BVBBV049019538 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-2070s 
082 0 |a 658.05 
084 |a QP 345  |0 (DE-625)141866:  |2 rvk 
100 1 |a Augusto, Adriano  |e Verfasser  |4 aut 
245 1 0 |a Enterprise, Business-Process and Information Systems Modeling  |b 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings 
250 |a 1st ed 
264 1 |a Cham  |b Springer International Publishing AG  |c 2022 
264 4 |c ©2022 
300 |a 1 Online-Ressource (362 Seiten) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Lecture Notes in Business Information Processing Series  |v v.450 
500 |a Description based on publisher supplied metadata and other sources 
505 8 |a Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References 
505 8 |a A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining 
505 8 |a 5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning 
505 8 |a 4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction 
505 8 |a 2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules 
505 8 |a 3 Implementation and Evaluation 
650 4 |a Business-Data processing 
650 4 |a Industrial management 
650 4 |a Management information systems-Congresses 
650 0 7 |a Prozessmanagement  |0 (DE-588)4353072-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Informationsmodellierung  |0 (DE-588)4214293-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Unternehmen  |0 (DE-588)4061963-1  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2022  |z Löwen  |2 gnd-content 
689 0 0 |a Unternehmen  |0 (DE-588)4061963-1  |D s 
689 0 1 |a Informationsmodellierung  |0 (DE-588)4214293-3  |D s 
689 0 2 |a Prozessmanagement  |0 (DE-588)4353072-2  |D s 
689 0 |5 DE-604 
700 1 |a Gill, Asif  |e Sonstige  |4 oth 
700 1 |a Bork, Dominik  |e Sonstige  |4 oth 
700 1 |a Nurcan, Selmin  |e Sonstige  |4 oth 
700 1 |a Reinhartz-Berger, Iris  |e Sonstige  |4 oth 
700 1 |a Schmidt, Rainer  |e Sonstige  |4 oth 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |a Augusto, Adriano  |t Enterprise, Business-Process and Information Systems Modeling  |d Cham : Springer International Publishing AG,c2022  |z 9783031074745 
912 |a ZDB-30-PQE 
999 |a oai:aleph.bib-bvb.de:BVB01-034282445 
966 e |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7001655  |l HWR01  |p ZDB-30-PQE  |q HWR_PDA_PQE  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1804185295714779136
adam_txt
any_adam_object
any_adam_object_boolean
author Augusto, Adriano
author_facet Augusto, Adriano
author_role aut
author_sort Augusto, Adriano
author_variant a a aa
building Verbundindex
bvnumber BV049019538
classification_rvk QP 345
collection ZDB-30-PQE
contents Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References
A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining
5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning
4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction
2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules
3 Implementation and Evaluation
ctrlnum (ZDB-30-PQE)EBC7001655
(ZDB-30-PAD)EBC7001655
(ZDB-89-EBL)EBL7001655
(OCoLC)1322834834
(DE-599)BVBBV049019538
dewey-full 658.05
dewey-hundreds 600 - Technology (Applied sciences)
dewey-ones 658 - General management
dewey-raw 658.05
dewey-search 658.05
dewey-sort 3658.05
dewey-tens 650 - Management and auxiliary services
discipline Wirtschaftswissenschaften
discipline_str_mv Wirtschaftswissenschaften
edition 1st ed
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>12032nmm a2200661zcb4500</leader><controlfield tag="001">BV049019538</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230626s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031074752</subfield><subfield code="9">978-3-031-07475-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC7001655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC7001655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL7001655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1322834834</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049019538</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.05</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Augusto, Adriano</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise, Business-Process and Information Systems Modeling</subfield><subfield code="b">23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (362 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes in Business Information Processing Series</subfield><subfield code="v">v.450</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3 Implementation and Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business-Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems-Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prozessmanagement</subfield><subfield code="0">(DE-588)4353072-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsmodellierung</subfield><subfield code="0">(DE-588)4214293-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2022</subfield><subfield code="z">Löwen</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationsmodellierung</subfield><subfield code="0">(DE-588)4214293-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Prozessmanagement</subfield><subfield code="0">(DE-588)4353072-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gill, Asif</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bork, Dominik</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nurcan, Selmin</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reinhartz-Berger, Iris</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schmidt, Rainer</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Augusto, Adriano</subfield><subfield code="t">Enterprise, Business-Process and Information Systems Modeling</subfield><subfield code="d">Cham : Springer International Publishing AG,c2022</subfield><subfield code="z">9783031074745</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034282445</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7001655</subfield><subfield code="l">HWR01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2022 Löwen gnd-content
genre_facet Konferenzschrift 2022 Löwen
id DE-604.BV049019538
illustrated Not Illustrated
index_date 2024-07-03T22:13:39Z
indexdate 2024-07-10T09:52:58Z
institution BVB
isbn 9783031074752
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-034282445
oclc_num 1322834834
open_access_boolean
owner DE-2070s
owner_facet DE-2070s
physical 1 Online-Ressource (362 Seiten)
psigel ZDB-30-PQE
ZDB-30-PQE HWR_PDA_PQE
publishDate 2022
publishDateSearch 2022
publishDateSort 2022
publisher Springer International Publishing AG
record_format marc
series2 Lecture Notes in Business Information Processing Series
spelling Augusto, Adriano Verfasser aut
Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
1st ed
Cham Springer International Publishing AG 2022
©2022
1 Online-Ressource (362 Seiten)
txt rdacontent
c rdamedia
cr rdacarrier
Lecture Notes in Business Information Processing Series v.450
Description based on publisher supplied metadata and other sources
Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References
A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining
5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning
4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction
2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules
3 Implementation and Evaluation
Business-Data processing
Industrial management
Management information systems-Congresses
Prozessmanagement (DE-588)4353072-2 gnd rswk-swf
Informationsmodellierung (DE-588)4214293-3 gnd rswk-swf
Unternehmen (DE-588)4061963-1 gnd rswk-swf
(DE-588)1071861417 Konferenzschrift 2022 Löwen gnd-content
Unternehmen (DE-588)4061963-1 s
Informationsmodellierung (DE-588)4214293-3 s
Prozessmanagement (DE-588)4353072-2 s
DE-604
Gill, Asif Sonstige oth
Bork, Dominik Sonstige oth
Nurcan, Selmin Sonstige oth
Reinhartz-Berger, Iris Sonstige oth
Schmidt, Rainer Sonstige oth
Erscheint auch als Druck-Ausgabe Augusto, Adriano Enterprise, Business-Process and Information Systems Modeling Cham : Springer International Publishing AG,c2022 9783031074745
spellingShingle Augusto, Adriano
Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References
A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining
5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning
4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction
2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules
3 Implementation and Evaluation
Business-Data processing
Industrial management
Management information systems-Congresses
Prozessmanagement (DE-588)4353072-2 gnd
Informationsmodellierung (DE-588)4214293-3 gnd
Unternehmen (DE-588)4061963-1 gnd
subject_GND (DE-588)4353072-2
(DE-588)4214293-3
(DE-588)4061963-1
(DE-588)1071861417
title Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
title_auth Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
title_exact_search Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
title_exact_search_txtP Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
title_full Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
title_fullStr Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
title_full_unstemmed Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
title_short Enterprise, Business-Process and Information Systems Modeling
title_sort enterprise business process and information systems modeling 23rd international conference bpmds 2022 and 27th international conference emmsad 2022 held at caise 2022 leuven belgium june 6 7 2022 proceedings
title_sub 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
topic Business-Data processing
Industrial management
Management information systems-Congresses
Prozessmanagement (DE-588)4353072-2 gnd
Informationsmodellierung (DE-588)4214293-3 gnd
Unternehmen (DE-588)4061963-1 gnd
topic_facet Business-Data processing
Industrial management
Management information systems-Congresses
Prozessmanagement
Informationsmodellierung
Unternehmen
Konferenzschrift 2022 Löwen
work_keys_str_mv AT augustoadriano enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings
AT gillasif enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings
AT borkdominik enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings
AT nurcanselmin enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings
AT reinhartzbergeriris enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings
AT schmidtrainer enterprisebusinessprocessandinformationsystemsmodeling23rdinternationalconferencebpmds2022and27thinternationalconferenceemmsad2022heldatcaise2022leuvenbelgiumjune672022proceedings