849 resultados para Defense Systems Management College. Deliberation Support Division.


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article describes the architecture of a monitoring component for the YAWL system. The architecture proposed is based on sensors and it is realized as a YAWL service to have perfect integration with the YAWL systems. The architecture proposed is generic and applicable in different contexts of business process monitoring. Finally, it was tested and evaluated in the context of risk monitoring for business processes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The increased adoption of business process management approaches, tools and practices, has led organizations to accumulate large collections of business process models. These collections can easily include hundred to thousand models, especially in the context of multinational corporations or as a result of organizational mergers and acquisitions. A concrete problem is thus how to maintain these large repositories in such a way that their complexity does not hamper their practical usefulness as a means to describe and communicate business operations. This paper proposes a technique to automatically infer suitable names for business process models and fragments thereof. This technique is useful for model abstraction scenarios, as for instance when user-specific views of a repository are required, or as part of a refactoring initiative aimed to simplify the repository’s complexity. The technique is grounded in an adaptation of the theory of meaning to the realm of business process models. We implemented the technique in a prototype tool and conducted an extensive evaluation using three process model collections from practice and a case study involving process modelers with different experience.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Process-aware information systems (PAISs) can be configured using a reference process model, which is typically obtained via expert interviews. Over time, however, contextual factors and system requirements may cause the operational process to start deviating from this reference model. While a reference model should ideally be updated to remain aligned with such changes, this is a costly and often neglected activity. We present a new process mining technique that automatically improves the reference model on the basis of the observed behavior as recorded in the event logs of a PAIS. We discuss how to balance the four basic quality dimensions for process mining (fitness, precision, simplicity and generalization) and a new dimension, namely the structural similarity between the reference model and the discovered model. We demonstrate the applicability of this technique using a real-life scenario from a Dutch municipality.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: Critical care units are designed and resourced to save lives, yet the provision of end-of-life care is a significant component of nursing work in these settings. Limited research has investigated the actual practices of critical care nurses in the provision of end-of-life care, or the factors influencing these practices. To improve the care that patients at the end of life and their families receive, and to support nurses in the provision of this care, further research is needed. The purpose of this study was to identify critical care nurses' end-of-life care practices, the factors influencing the provision of end-of-life care and the factors associated with specific end-of-life care practices. Methods: A three-phase exploratory sequential mixed-methods design was utilised. Phase one used a qualitative approach involving interviews with a convenience sample of five intensive care nurses to identify their end-of-life care experiences and practices. In phase two, an online survey instrument was developed, based on a review of the literature and the findings of phase one. The survey instrument was reviewed by six content experts and pilot tested with a convenience sample of 28 critical care nurses (response rate 45%) enrolled in a postgraduate critical care nursing subject. The refined survey instrument was used in phase three of this study to conduct a national survey of critical care nurses. Descriptive analyses, exploratory factor analysis and univariate general linear modelling was undertaken on completed survey responses from 392 critical care nurses (response rate 25%). Results: Six end-of-life care practice areas were identified in this study: information sharing, environmental modification, emotional support, patient and family-centred decision making, symptom management and spiritual support. The items most frequently identified as always undertaken by critical care nurses in the provision of end-of-life care were from the information sharing and environmental modification practice areas. Items least frequently identified as always undertaken included items from the emotional support practice area. Eight factors influencing the provision of end-of-life care were identified: palliative values, patient and family preferences, knowledge, preparedness, organisational culture, resources, care planning, and emotional support for nurses. Strong agreement was noted with items reflecting values consistent with a palliative approach and inclusion of patient and family preferences. Variation was noted in agreement for items regarding opportunities for knowledge acquisition in the workplace and formal education, yet most respondents agreed that they felt adequately prepared. A context of nurse-led practice was identified, with variation in access to resources noted. Collegial support networks were identified as a source of emotional support for critical care nurses. Critical care nurses reporting values consistent with a palliative approach and/or those who scored higher on support for patient and family preferences were more likely to be engaged in end-of-life care practice areas identified in this study. Nurses who reported higher levels of preparedness and access to opportunities for knowledge acquisition were more likely to report engaging in interpersonal practices that supported patient and family centred decision making and emotional support of patients and their families. A negative relationship was identified between the explanatory variables of emotional support for nurses and death anxiety, and the patient and family centred decision making practice area. Contextual factors had a limited influence as explanatory variables of specific end-of-life care practice areas. Gender was identified as a significant explanatory variable in the emotional and spiritual support practice areas, with male gender associated with lower summated scores on these practice scales. Conclusions: Critical care nurses engage in practices to share control with and support inclusion of families experiencing death and dying. The most frequently identified end-of-life care practices were those that are easily implemented, practical strategies aimed at supporting the patient at the end of life and the patient's family. These practices arguably require less emotional engagement by the nurse. Critical care nurses' responses reflected values consistent with a palliative approach and a strong commitment to the inclusion of families in end-of-life care, and these factors were associated with engagement in all end-of-life care practice areas. Perceived preparedness or confidence with the provision of end-of-life care was associated with engagement in interpersonal caring practices. Critical care nurses autonomously engage in the provision of end-of-life care within the constraints of an environment designed for curative care and rely on their colleagues for emotional support. Critical care nurses must be adequately prepared and supported to provide comprehensive care in all areas of end-of-life care practice. The findings of this study raise important implications, and informed recommendations for practice, education and further research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Internet of Things facilitates the identification, digitization, and control of physical objects. However, it is the availability of cost effective sensors, mobile smart devices, scalable cloud infrastructure, and advanced analytics that have consumerized the Internet of Things. The accessibility of digital representations of things has transformative potential and provides entire new affordances for organizations and their ecosystems across most industries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this editorial letter, we provide the readers of Information Systems Management with a background on process design before we discuss the content of the special issue proper. By introducing and describing a so-called process design compass we aim to clarify what developments in the field are taking place and how the papers in this special issue expand on our current knowledge in this domain.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This teaching case describes how SAP, a leading global information technology (IT) solutions provider, embarked on a large-scale transformation program to implement a dual sustainability strategy of: (a) internally transforming the organization, and (b) addressing a business opportunity by developing IT solutions that enable their customers to become more sustainable. This case provides students with significant information about the development of SAP towards sustainability, including the company's underlying motivation, their approach to change and related challenges, and their use of IT to enable the transformation. The teaching case provides an opportunity to critically examine the benefits and risks of using IT in an effort to improve the sustainability of an organization, and to develop appropriate models for sustainable strategies and IT implementation efforts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Organizations often have some innovation capability but typically not across all stages of the innovation process. Understanding key requirements of each stage helps shifting the capability focus to cover the entire innovation process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The question concerning what makes for good BPM is often raised. A recent call from Paul Harmon on the BPTrends Discussion LinkedIN Group for key issues in BPM received 189 answers within two months, with additional answers still appearing. I have teamed up with a number of BPM researchers and practitioners to bring together our joint experience in a BPM workshop at the University in Liechtenstein in 2013, where we developed ten principles of good BPM, later published in Business Process Management Journal (vom Brocke et al., 2014). The paper, which has received considerable attention in academia, was ranked the journal’s most downloaded paper the month it was published. Slides on Slideshare that provide a brief summary of the paper have been accessed more than 3,000 times since they were first put online in March 2014. Given the importance of the topic–what makes for good BPM–and the positive response to the ten principles, I wrote this note with the co-authors of the original BPMJ paper to outline the ten principles and illustrate how to use them in practice. We invite all readers to engage in this discussion via any channel they find appropriate.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The integration of Information and Communication Technologies (ICT) into healthcare processes “eHealth” is driving enormous change in healthcare delivery and productivity. The transformations empower patients and present opportunities for new synergies between healthcare professionals, clinical decision makers, policy makers and educators. Technologies that are directly driving changes include Tele-medicine, Electronic health records (EHR), Standards to ensure computer systems inter-operate, Decision support systems, Data mining and easy access to medical information. This workshop provides an introduction to key informatics initiatives in eHealth using real examples and suggests how applications can be applied to modern society.

Relevância:

100.00% 100.00%

Publicador: