Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2022
|
Ausgabe: | 1st ed |
Schriftenreihe: | Lecture Notes in Business Information Processing Series
v.450 |
Schlagworte: | |
Online-Zugang: | HWR01 |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Inhaltsangabe:
- Intro
- Preface
- BPMDS 2022
- EMMSAD 2022
- BPMDS 2022 Organization
- EMMSAD 2022 Organization
- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract)
- Contents
- Actual and Perceived Challenges (BPMDS 2022)
- Process Mining Challenges Perceived by Analysts: An Interview Study
- 1 Introduction
- 2 Related Work
- 3 Research Method
- 4 Findings
- 4.1 Defining Research Question
- 4.2 Data Collection
- 4.3 Data Pre-Processing
- 4.4 Mining and Analysis
- 4.5 Stakeholder Evaluation
- 4.6 Challenges Ranging Across All Phases
- 5 Discussion
- 6 Conclusion
- References
- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges
- 1 Introduction
- 2 IIoT Security Management Process
- 3 Perspectives for Process-Driven IIoT Security
- 3.1 Process-Oriented Asset Identification and Threat Analysis
- 3.2 Process-Oriented Risk and Measure Assessment
- 3.3 Process-Oriented Measure Implementation
- 3.4 Process-Oriented Monitoring and Security Process Audit
- 4 Challenges and Intersections
- 4.1 Modelling Notations for IIoT- and Security-Aware Processes
- 4.2 Process Modelling Guidelines and Procedures
- 4.3 Executable Process Models
- 4.4 Process Analytics for IIoT and Security
- 5 Conclusion and Outlook
- References
- Business Process Modeling (BPMDS 2022)
- RBPMN - The Power of Roles for Business Process Modeling with BPMN
- 1 Introduction
- 1.1 Challenges of BP Modeling
- 1.2 Research Approach
- 2 Role Modeling
- 2.1 Roles
- 2.2 Roles in Business Process Modeling
- 3 The RBPMN Modeling Language
- 3.1 Developing the RBPMN Modeling Language
- 3.2 Extending the BPMN
- 3.3 The Syntax of RBPMN Elements
- 4 Modeling Case Study
- 5 Evaluation
- 5.1 Workflow Patterns
- 5.2 Role Feature Coverage
- 6 Conclusion
- References
- A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems
- 1 Introduction
- 2 Background
- 2.1 Business Process Model and Notation
- 2.2 Process Modeling Problems and Anti-patterns
- 3 Related Works
- 3.1 Anti-patterns on Business Process Models
- 3.2 Visual Feedback About Problems in Business Process Models
- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems
- 4.1 Process Modeling Tools Selection
- 4.2 Experiment Parameters
- 4.3 Overall Results
- 4.4 Comparison with Related Work
- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature
- 5.1 Applying Recommendations for Small Process Models
- 5.2 Applying Recommendations for Large Process Models
- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools
- 6 Conclusion
- References
- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022)
- A Technique for Collaboration Discovery
- 1 Introduction
- 2 The colliery Technique
- 3 The colliery Tool
- 4 Experimental Evaluation
- 5 Related Works
- 6 Concluding Remarks
- References
- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management
- 1 Introduction
- 2 Literature Review
- 3 Research Method
- 4 Findings and Discussion
- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources
- 4.2 NPOs Instinctively Manage Processes
- 4.3 NPOs Employ Strategic Approaches to Manage Processes
- 4.4 NPO Governance and External Bodies Drive Process Change
- 5 Conclusion
- References
- Event Logs - Why it Deviates? (BPMDS 2022)
- Deviance Analysis by Means of Redescription Mining
- 1 Introduction
- 2 Background
- 2.1 Event Logs
- 2.2 Deviance Mining
- 2.3 Declare
- 3 Related Work
- 4 Redescription Mining
- 5 Deviance Mining Approach
- 5.1 Overall Structure of the Pipeline
- 5.2 Generate Missing Input
- 5.3 Declare Constraint Based Feature Extraction
- 5.4 Redescription Mining
- 5.5 Comparisons and Analysis of Discovered Redescription Rules
- 5.6 Natural Language Generation
- 6 Implementation and Evaluation
- 6.1 Datasets
- 6.2 Evaluation Setup
- 6.3 Discussion of the Order-to-Cash Process
- 6.4 Overall Results and Conclusion
- 7 Future Work
- References
- Detecting Context Activities in Event Logs
- 1 Introduction
- 2 Motivation Example
- 3 Background
- 4 Preliminaries
- 5 The Proposed Method
- 5.1 Build Context Traces
- 5.2 Build a Point Cloud
- 5.3 Construct Convex Hulls for the Event Log
- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages
- 5.5 Identify Context Activities
- 6 Evaluation on Synthetic Data
- 7 Evaluation on Real-Life Data
- 8 Conclusion
- References
- Event Log Generation: An Industry Perspective
- 1 Introduction
- 2 Process Mining Overview
- 3 Motivation, Research Questions, and Survey Structure
- 4 Survey Results
- 4.1 Demographics
- 4.2 Process Execution
- 4.3 Process Scoping and Data Sources
- 4.4 Event Logs
- 4.5 Process Discovery
- 4.6 Process Analysis
- 5 Discussion
- 5.1 Questioning Academic Assumptions
- 5.2 Relevance of Academic Research
- 5.3 Emerging Research Directions
- 6 Conclusion
- References
- Foundations of Modeling and Method Engineering (EMMSAD 2022)
- Towards a Systematic Method for Developing Meta Attack Language Instances
- 1 Introduction
- 2 Background
- 2.1 Design Science Research
- 2.2 Meta Attack Language
- 3 Method
- 4 The Approach: Applying ADR to Create MAL DSLs
- 4.1 Stage 1 - Problem Formulation
- 4.2 Stage 2 - Building, Intervention, and Evaluation
- 4.3 Stage 3 - Reflection and Learning
- 4.4 Stage 4 - Formalization of Learning
- 5 Demonstration
- 6 Related Work
- 7 Discussion and Conclusion
- References
- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022)
- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems
- 1 Introduction
- 2 Towards an Interactive Understanding of Transparency
- 3 Goals, Requirements and Existing Approaches
- 4 Extensions to MEMO in Support of Transparency
- 5 Exemplary Application
- 6 Conclusions
- References
- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data
- 1 Introduction
- 2 Related Work
- 3 Method
- 3.1 Training Log Generation
- 3.2 Model Training
- 3.3 Segmentation
- 4 User Study
- 5 Conclusion
- References
- The Integration of Process Simulation Within the Business Architecture
- 1 Introduction
- 2 Background
- 2.1 Related Work
- 2.2 PGA Modeling Technique
- 2.3 PGA Simulation Technique
- 3 Business Architecture Simulation Technique
- 3.1 Building a Business Architecture Hierarchy
- 3.2 Simulate the Performance Level of Process Elements
- 3.3 Propagation of Performance Measures
- 3.4 Improvement Analysis
- 4 Conclusion
- References
- Information Systems and Requirements Modeling (EMMSAD 2022)
- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey
- 1 Introduction
- 2 Related Studies
- 3 Research Methodology
- 4 Academic MDE Approaches
- 4.1 Review Process
- 4.2 Results
- 5 Industrial Low-Code and No-Code Approaches
- 5.1 Review Process
- 5.2 Results
- 6 Use Case for Low-Code Blockchain Development
- 7 Discussion and Requirements for Future Developments
- 8 Conclusion
- References
- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method
- 1 Introduction
- 2 Research Baseline
- 2.1 Ontological Analysis
- 2.2 An Ontology for Requirements (NFRO)
- 3 ObRE Method
- 4 Applying ObRE to Ethical Requirements for Intelligent Systems
- 4.1 The Common Ontology of Value and Risk (COVER)
- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements
- 4.3 Requirements Analysis Method Execution
- 5 Related Works
- 6 Final Remarks
- References
- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work
- 1 Toward a New Approach for Describing Digital Agents
- 2 Digital Agents as Algorithmic Agents
- 3 Work Systems as the Context for Using Digital Agents
- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents
- 4 Facets of Work
- 5 The Agent Responsibility Framework
- 6 Application of the AR Framework to Examples
- 6.1 Example: An Ecommerce Platform as a Digital Agent
- 6.2 Example: A Real Time Advertising Auction as a Digital Agent
- 6.3 Example: A Self-driving Car's Information System as a Digital Agent
- 7 Discussion and Conclusions
- References
- A Method for Ontology-Driven Minimum Viable Platform Development
- 1 Introduction
- 2 Previous Research
- 3 A Method for Ontology-Driven MVP Development
- 4 Method Demonstration: SafaRide
- 4.1 Analysis
- 4.2 MVP Development
- 4.3 Testing
- 5 Discussion and Future Work
- 6 Conclusion
- References
- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams
- 1 Introduction
- 2 Related Work
- 3 Presentation of MVM
- 3.1 Context
- 3.2 Feedback
- 3.3 Running Example
- 3.4 User Interface
- 4 Conclusions and Future Work
- References
- Domain-Specific and Knowledge Modeling (EMMSAD 2022)
- Towards Simplification of ME-Maps
- 1 Introduction
- 2 Simplification of ME-Maps
- 2.1 Valid Simplification
- 2.2 Simplification Rules
- 3 Implementation and Evaluation