853 resultados para Business process modelling
Resumo:
With the development of enterprise informatisation, Product Lifecycle Management (PLM) systems have been widely deployed and applied in enterprises. This paper analyzes the requirement that conducting version operations on business objects as specified in process models should be compliant with the versioning policies imposed by product lifecycles. This leads to the introduction of the concept of versioning compliance, and the approach of compliance checking that we proposed in our earlier work, which comprises both syntactical compatibility and behavioural compatibility checking. The paper then focuses on the tool implementation for providing automated support to the versioning compliance checking. An empirical evaluation of the tool was also performed with industrial partners using the well-known questionnaire-based method. The evaluation and feedback from practitioners further evidence the practical significance of this research question in the PLM field and demonstrate that the proposed solution with its automated tool support possesses a high application potential.
Resumo:
In his paper “Approaches to Modeling Business Processes. A Critical Analysis of BPMN, Workflow Patterns and YAWL”, Egon Börger criticizes the work of the Workflow Patterns Initiative in a rather provocative manner. Although the workflow patterns and YAWL are well established and frequently used, Börger seems to misunderstand the goals and contributions of the Workflow Patterns Initiative. Therefore, we put the workflow patterns and YAWL in their historic context. Moreover, we address some of the criticism of Börger by pointing out the real purpose of the workflow patterns and their relationship to formal languages (Petri nets) and real-life WFM/BPM systems.
Resumo:
- Covers entire research process from start to end - Places particular emphasis on motivational components, modes of inquiry in scholarly conduct, theorizing and planning research - Includes aspects such as publication and ethical challenges This book is designed to introduce doctoral and other higher-degree research students to the process of scientific research in the fields of Information Systems as well as fields of Information Technology, Business Process Management and other related disciplines within the social sciences. It guides research students in their process of learning the life of a researcher. In doing so, it provides an understanding of the essential elements, concepts and challenges of the journey into research studies. It also provides a gateway for the student to inquire deeper about each element covered. Comprehensive and broad but also succinct and compact, the book is focusing on the key principles and challenges for a novice doctoral student.
Resumo:
This month, Jan Recker turns his attention to the technological side of BPM research and education. He engaged in a collaboration with two colleagues at Queensland University, Dr Marcello La Rosa and Eike Bernhard, on an initiative on the development of an advanced BPM technology - an Advanced Process Model Repository called Apromore. In this Column, they use the example of Apromore to showcase how BPM technologies are conceived, designed, developed and applied.
Resumo:
Effective risk management is crucial for any organisation. One of its key steps is risk identification, but few tools exist to support this process. Here we present a method for the automatic discovery of a particular type of process-related risk, the danger of deadline transgressions or overruns, based on the analysis of event logs. We define a set of time-related process risk indicators, i.e., patterns observable in event logs that highlight the likelihood of an overrun, and then show how instances of these patterns can be identified automatically using statistical principles. To demonstrate its feasibility, the approach has been implemented as a plug-in module to the process mining framework ProM and tested using an event log from a Dutch financial institution.
Resumo:
Many construction industry decision-makers believe there is a lack of off-site manufacture (OSM) adoption for non-residential construction in Australia. Identification of construction business process was considered imperative in order to assist decision-makers to increase OSM utilisation. The premise that domain knowledge can be re-used to provide an intervention point in the construction process led a team of researchers to construct simple base-line process models for the complete construction process, segmented into six phases. Sixteen domain knowledge industry experts were asked to review the construction phase base-line models to answer the question “Where in the process illustrated by this base-line model phase is an OSM task?”. Through an iterative and generative process a number of off-site manufacture intervention points were identified and integrated into the process models. The re-use of industry expert domain knowledge provided suggestions for new ways to do basic tasks thus facilitating changes to current practice. It is expected that implementation of the new processes will lead to systemic industry change and thus a growth in productivity due to increased adoption of OSM.
Resumo:
Information security policies play an important role in achieving information security. Confidentiality, Integrity, and Availability are classic information security goals attained by enforcing appropriate security policies. Workflow Management Systems (WfMSs) also benefit from inclusion of these policies to maintain the security of business-critical data. However, in typical WfMSs these policies are designed to enforce the organisation’s security requirements but do not consider those of other stakeholders. Privacy is an important security requirement that concerns the subject of data held by an organisation. WfMSs often process sensitive data about individuals and institutions who demand that their data is properly protected, but WfMSs fail to recognise and enforce privacy policies. In this paper, we illustrate existing WfMS privacy weaknesses and introduce WfMS extensions required to enforce data privacy. We have implemented these extensions in the YAWL system and present a case scenario to demonstrate how it can enforce a subject’s privacy policy.
Resumo:
Research on Enterprise Resource Planning (ERP) Systems is becoming a well-established research theme in Information Systems (IS) research. Enterprise Resource Planning Systems, given its unique differentiations with other IS applications, have provided an interesting backdrop to test and re-test some of the key and fundamental concepts in IS. While some researchers have tested well-established concepts of technology acceptance, system usage and system success in the context of ERP Systems, others have researched how new paradigms like cloud computing and social media integrate with ERP Systems. Moreover, ERP Systems provided the context for cross disciplinary research such as knowledge management, project management and business process management research. Almost after two-decades since its inception in IS research, this paper provides a critique of 198 papers published on ERP Systems since 2006-2012. We observe patterns on ES research, provide comparisons to past studies and provide future research directions.
Resumo:
The role of Information and Communications Technology (ICT) has been identified as an important factor by the United Nations in achieving the millennium development goals (UNAPCICT, 2012)1. The potential for ICT has been identified as a means to reducing poverty, creating global communities by providing access to the internet and mobile networks to rural communities, improving education services, medical services, and information availability. As of today, significant amounts of funds have been invested by the governments and donor organizations in ‘Information and Communication Technologies for Development (ICT4D)’projects by establishing telecenters, e-villages, e-health, electronic and mobile banking, and egovernment systems for citizens in general, and more specifically, rural communities to bridge the digital divide (Heeks & Molla, 2009).
Resumo:
Despite advances in the field of workflow flexibility, there is still insufficient support for dealing with unforeseen exceptions. In particular, it is challenging to find a solution which preserves the intent of the process as much as possible when such exceptions are encountered. This challenge can be alleviated by making the connection between a process and its objectives more explicit. This paper presents a demo illustrating the blended workflow approach where two specifications are fused together, a "classic" process model and a goal model. End users are guided by the process model but may deviate from this model whenever unexpected situations are encountered. The two models involved provide views on the process and the demo shows how one can switch between these views and how they are kept consistent by the blended workflow engine. A simple example involving the making of a doctor's appointment illustrates the potential advantages of the proposed approach to both researchers and developers.
Resumo:
Video presented as part of Melbourne Smart Services CRC Participants conferences. Video showing the results of our collaboration with the Smart Services CRC and Austin Health. We created an environment for nurses to learn ICU Handover processes. Handover processes in an ICU involve, briefing meetings with ward nurses, and then a bedside handover of patient care information to the nurse starting the next shift. This simulation will allow students to remotely practice their handover skills, thus freeing up expensive resources at teaching hospitals, and enabling them to be at a higher skill level when they commence live training. More information available at: www.bpmve.org.
Resumo:
Video presented as part of AMCIS 2010 conference in Lima Peru. New improved collaborative BPMN editor video, showing a new interface and collaboration capabilities via remote login of another avatar.
Resumo:
Video presented as part of ACIS 2009 conference in Melbourne Australia. Movie showing the execution of a small prototype Hypbolic projection of a process model. Useful for the traversal of large process models, as the entire hierarchy can be visualised as a whole, maintaining a sense of context while moving through such complex topologies. Related ACIS Conference paper is at: http://eprints.qut.edu.au/29296/
Resumo:
Video presented as part of ACIS 2009 conference in Melbourne Australia. This movie is a demonstration of the use of 3D Virtual Environments to visualise 3D BPMN Process Models, and in particular, to highlight any issues with the process model that are spatial in nature. This work is part of a paper accepted for the Asia-Pacific Conference on Conceptual Modelling (APCCM 2010) to be held in Brisbane - http://2010.apccm.org/
Resumo:
Video presented as part of CyberGames 2006 conference in Fremantle Australia. Demonstration video showing the QUT YAWL workflow system controlling a game. The grey user interface, spawning of enemies and registration of killings is coordinated by the YAWL workflow tool, developed at QUT, Brisbane, Australia. This shows how easy it is to give a 3D interface to workflow systems. More information on this work is at www.bpmve.org.