Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6-7, 2022, Proceedings

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Augusto, Adriano (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Cham Springer International Publishing AG 2022
Ausgabe:1st ed
Schriftenreihe:Lecture Notes in Business Information Processing Series v.450
Schlagworte:
Online-Zugang:HWR01
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Inhaltsangabe:
  • Intro
  • Preface
  • BPMDS 2022
  • EMMSAD 2022
  • BPMDS 2022 Organization
  • EMMSAD 2022 Organization
  • Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract)
  • Contents
  • Actual and Perceived Challenges (BPMDS 2022)
  • Process Mining Challenges Perceived by Analysts: An Interview Study
  • 1 Introduction
  • 2 Related Work
  • 3 Research Method
  • 4 Findings
  • 4.1 Defining Research Question
  • 4.2 Data Collection
  • 4.3 Data Pre-Processing
  • 4.4 Mining and Analysis
  • 4.5 Stakeholder Evaluation
  • 4.6 Challenges Ranging Across All Phases
  • 5 Discussion
  • 6 Conclusion
  • References
  • Towards Process-Oriented IIoT Security Management: Perspectives and Challenges
  • 1 Introduction
  • 2 IIoT Security Management Process
  • 3 Perspectives for Process-Driven IIoT Security
  • 3.1 Process-Oriented Asset Identification and Threat Analysis
  • 3.2 Process-Oriented Risk and Measure Assessment
  • 3.3 Process-Oriented Measure Implementation
  • 3.4 Process-Oriented Monitoring and Security Process Audit
  • 4 Challenges and Intersections
  • 4.1 Modelling Notations for IIoT- and Security-Aware Processes
  • 4.2 Process Modelling Guidelines and Procedures
  • 4.3 Executable Process Models
  • 4.4 Process Analytics for IIoT and Security
  • 5 Conclusion and Outlook
  • References
  • Business Process Modeling (BPMDS 2022)
  • RBPMN - The Power of Roles for Business Process Modeling with BPMN
  • 1 Introduction
  • 1.1 Challenges of BP Modeling
  • 1.2 Research Approach
  • 2 Role Modeling
  • 2.1 Roles
  • 2.2 Roles in Business Process Modeling
  • 3 The RBPMN Modeling Language
  • 3.1 Developing the RBPMN Modeling Language
  • 3.2 Extending the BPMN
  • 3.3 The Syntax of RBPMN Elements
  • 4 Modeling Case Study
  • 5 Evaluation
  • 5.1 Workflow Patterns
  • 5.2 Role Feature Coverage
  • 6 Conclusion
  • References
  • A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems
  • 1 Introduction
  • 2 Background
  • 2.1 Business Process Model and Notation
  • 2.2 Process Modeling Problems and Anti-patterns
  • 3 Related Works
  • 3.1 Anti-patterns on Business Process Models
  • 3.2 Visual Feedback About Problems in Business Process Models
  • 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems
  • 4.1 Process Modeling Tools Selection
  • 4.2 Experiment Parameters
  • 4.3 Overall Results
  • 4.4 Comparison with Related Work
  • 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature
  • 5.1 Applying Recommendations for Small Process Models
  • 5.2 Applying Recommendations for Large Process Models
  • 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools
  • 6 Conclusion
  • References
  • Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022)
  • A Technique for Collaboration Discovery
  • 1 Introduction
  • 2 The colliery Technique
  • 3 The colliery Tool
  • 4 Experimental Evaluation
  • 5 Related Works
  • 6 Concluding Remarks
  • References
  • Understanding Process Management in Non-profit Organisations Without Formal Business Process Management
  • 1 Introduction
  • 2 Literature Review
  • 3 Research Method
  • 4 Findings and Discussion
  • 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources
  • 4.2 NPOs Instinctively Manage Processes
  • 4.3 NPOs Employ Strategic Approaches to Manage Processes
  • 4.4 NPO Governance and External Bodies Drive Process Change
  • 5 Conclusion
  • References
  • Event Logs - Why it Deviates? (BPMDS 2022)
  • Deviance Analysis by Means of Redescription Mining
  • 1 Introduction
  • 2 Background
  • 2.1 Event Logs
  • 2.2 Deviance Mining
  • 2.3 Declare
  • 3 Related Work
  • 4 Redescription Mining
  • 5 Deviance Mining Approach
  • 5.1 Overall Structure of the Pipeline
  • 5.2 Generate Missing Input
  • 5.3 Declare Constraint Based Feature Extraction
  • 5.4 Redescription Mining
  • 5.5 Comparisons and Analysis of Discovered Redescription Rules
  • 5.6 Natural Language Generation
  • 6 Implementation and Evaluation
  • 6.1 Datasets
  • 6.2 Evaluation Setup
  • 6.3 Discussion of the Order-to-Cash Process
  • 6.4 Overall Results and Conclusion
  • 7 Future Work
  • References
  • Detecting Context Activities in Event Logs
  • 1 Introduction
  • 2 Motivation Example
  • 3 Background
  • 4 Preliminaries
  • 5 The Proposed Method
  • 5.1 Build Context Traces
  • 5.2 Build a Point Cloud
  • 5.3 Construct Convex Hulls for the Event Log
  • 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages
  • 5.5 Identify Context Activities
  • 6 Evaluation on Synthetic Data
  • 7 Evaluation on Real-Life Data
  • 8 Conclusion
  • References
  • Event Log Generation: An Industry Perspective
  • 1 Introduction
  • 2 Process Mining Overview
  • 3 Motivation, Research Questions, and Survey Structure
  • 4 Survey Results
  • 4.1 Demographics
  • 4.2 Process Execution
  • 4.3 Process Scoping and Data Sources
  • 4.4 Event Logs
  • 4.5 Process Discovery
  • 4.6 Process Analysis
  • 5 Discussion
  • 5.1 Questioning Academic Assumptions
  • 5.2 Relevance of Academic Research
  • 5.3 Emerging Research Directions
  • 6 Conclusion
  • References
  • Foundations of Modeling and Method Engineering (EMMSAD 2022)
  • Towards a Systematic Method for Developing Meta Attack Language Instances
  • 1 Introduction
  • 2 Background
  • 2.1 Design Science Research
  • 2.2 Meta Attack Language
  • 3 Method
  • 4 The Approach: Applying ADR to Create MAL DSLs
  • 4.1 Stage 1 - Problem Formulation
  • 4.2 Stage 2 - Building, Intervention, and Evaluation
  • 4.3 Stage 3 - Reflection and Learning
  • 4.4 Stage 4 - Formalization of Learning
  • 5 Demonstration
  • 6 Related Work
  • 7 Discussion and Conclusion
  • References
  • Enterprise, Business Process, and Capability Modeling (EMMSAD 2022)
  • Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems
  • 1 Introduction
  • 2 Towards an Interactive Understanding of Transparency
  • 3 Goals, Requirements and Existing Approaches
  • 4 Extensions to MEMO in Support of Transparency
  • 5 Exemplary Application
  • 6 Conclusions
  • References
  • Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data
  • 1 Introduction
  • 2 Related Work
  • 3 Method
  • 3.1 Training Log Generation
  • 3.2 Model Training
  • 3.3 Segmentation
  • 4 User Study
  • 5 Conclusion
  • References
  • The Integration of Process Simulation Within the Business Architecture
  • 1 Introduction
  • 2 Background
  • 2.1 Related Work
  • 2.2 PGA Modeling Technique
  • 2.3 PGA Simulation Technique
  • 3 Business Architecture Simulation Technique
  • 3.1 Building a Business Architecture Hierarchy
  • 3.2 Simulate the Performance Level of Process Elements
  • 3.3 Propagation of Performance Measures
  • 3.4 Improvement Analysis
  • 4 Conclusion
  • References
  • Information Systems and Requirements Modeling (EMMSAD 2022)
  • Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey
  • 1 Introduction
  • 2 Related Studies
  • 3 Research Methodology
  • 4 Academic MDE Approaches
  • 4.1 Review Process
  • 4.2 Results
  • 5 Industrial Low-Code and No-Code Approaches
  • 5.1 Review Process
  • 5.2 Results
  • 6 Use Case for Low-Code Blockchain Development
  • 7 Discussion and Requirements for Future Developments
  • 8 Conclusion
  • References
  • Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method
  • 1 Introduction
  • 2 Research Baseline
  • 2.1 Ontological Analysis
  • 2.2 An Ontology for Requirements (NFRO)
  • 3 ObRE Method
  • 4 Applying ObRE to Ethical Requirements for Intelligent Systems
  • 4.1 The Common Ontology of Value and Risk (COVER)
  • 4.2 Domain Ontology Development and Instantiation: Ethical Requirements
  • 4.3 Requirements Analysis Method Execution
  • 5 Related Works
  • 6 Final Remarks
  • References
  • Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work
  • 1 Toward a New Approach for Describing Digital Agents
  • 2 Digital Agents as Algorithmic Agents
  • 3 Work Systems as the Context for Using Digital Agents
  • 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents
  • 4 Facets of Work
  • 5 The Agent Responsibility Framework
  • 6 Application of the AR Framework to Examples
  • 6.1 Example: An Ecommerce Platform as a Digital Agent
  • 6.2 Example: A Real Time Advertising Auction as a Digital Agent
  • 6.3 Example: A Self-driving Car's Information System as a Digital Agent
  • 7 Discussion and Conclusions
  • References
  • A Method for Ontology-Driven Minimum Viable Platform Development
  • 1 Introduction
  • 2 Previous Research
  • 3 A Method for Ontology-Driven MVP Development
  • 4 Method Demonstration: SafaRide
  • 4.1 Analysis
  • 4.2 MVP Development
  • 4.3 Testing
  • 5 Discussion and Future Work
  • 6 Conclusion
  • References
  • A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams
  • 1 Introduction
  • 2 Related Work
  • 3 Presentation of MVM
  • 3.1 Context
  • 3.2 Feedback
  • 3.3 Running Example
  • 3.4 User Interface
  • 4 Conclusions and Future Work
  • References
  • Domain-Specific and Knowledge Modeling (EMMSAD 2022)
  • Towards Simplification of ME-Maps
  • 1 Introduction
  • 2 Simplification of ME-Maps
  • 2.1 Valid Simplification
  • 2.2 Simplification Rules
  • 3 Implementation and Evaluation