
Enterprise, Business-Process and Information Systems Modeling
Beschreibung
Alles über E-Books | Antworten auf Fragen rund um E-Books, Kopierschutz und Dateiformate finden Sie in unserem Info- & Hilfebereich.
This book contains the refereed proceedings of the 13th International Conference on Business Process Modeling, Development and Support (BPMDS 2012) and the 17th International Conference on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2012), held together with the 24th International Conference on Advanced Information Systems Engineering (CAiSE 2012) in Gdansk, Poland, in June 2012.
The 17 papers accepted for BPMDS were selected from 48 submissions and cover a wide spectrum of issues related to business process development, modeling, and support. They are grouped into sections on business process in the cloud, advanced BPM in an organizational context, similarity, variations and configuration, BPM and requirements engineering, humans and business process models, and BPM technologies using computational methods.
The 13 papers accepted for EMMSAD were chosen from 28 submissions and focus on exploring, evaluating, and enhancing current information modeling methods and methodologies. They are grouped in sections on modeling of enterprise architecture, modeling facts and rules, business process modeling, modeling of non-functional requirements, safety modeling and analysis, quality of models and modeling languages, and supporting the learning of conceptual modeling.
Weitere Details
Weitere Ausgaben
Personen
Inhalt
- Title Page
- Preface
- Organization
- Table of Contents
- BPMDS
- Business Process in the Cloud (1)
- Scalable Business Process Enactment in Cloud Environments
- Introduction
- A Framework for Cloud-Based Business Process
- Cloud-Based Process Enactment
- Cloud Environmen nts
- Formalizing Cloud Environments
- Service System Based Process Enactment
- Related Work
- Conclusion and Outlook
- References
- Preparing for the Era of Cloud Computing: Towards a Framework for Selecting Business Process Support Services
- Motivation
- Basic Concepts
- Business Processes and Process Support Services
- Process Steps
- The Framework
- Input-Output
- Parallel Execution
- Parallel Dependencies
- Weak Dependencies
- Teams and Their Relationships
- Inter-step Collaboration
- BPS Services Capabilities
- Guidelines for Choosing Capabilities
- Discussion and Plans for the Future
- References
- Advanced BPM in an Organizational Context
- A Platform for Recombining Process Knowledge Chunks
- Introduction
- Related Work
- A Motivating Example
- Projects to Build Systems-of-Systems as the Context of Study
- Process and Knowledge Management
- Recombinable Process Knowledge Chunks
- Templates as Carriers of Process Knowledge
- Balancing Emergent Needs against Best Practices
- The ReKon Platform
- Creating Process Knowledge Chunks from Templates
- A Prototype Implementation
- Evaluation
- Results from the Pre-ReKon Assessment
- Results from the Post-ReKon Assessment
- Conclusion
- References
- An Exploratory Study on Collaboratively Conceptualizing Knowledge Intensive Processes
- Introduction
- Knowledge Intensive Processes
- KIP Fundamentals
- KIP Representation Approaches
- The KIP Ontology
- Exploratory Case Study
- Conclusions
- References
- A Proposal for Ownership Representation in the Context of Business Process Models
- Introduction
- Process Ownership
- Related Work
- AO-BPM
- An Approach to Represent Process and Aspect Owner
- Example
- Conclusion and Future Work
- References
- BPM and Requirements Engineering
- Modeling Security Requirements in Service Based Business Processes
- Introduction
- Motivating Example: The Loan Approval Process
- Proposed Solution
- Context for This Work
- Meta-Model for Non-functional Profiles
- Application to BPMN
- Tooling and Implementation
- Security Profile
- Separation of Duties (SoD)
- Binding of Duties (BoD)
- Confidentiality
- Non repudiation
- Privacy
- Applying the Security Profile to the Loan Approval Process
- Related Work
- Conclusion
- References
- A Conceptual Foundation of Requirements Engineering for Business Information Systems
- Motivation
- Research Approach
- Basic RE Concepts and Their Relationships
- Reference Issue Model
- The Business Environment View
- The Business Area View
- The System Environment View
- The Internal System View
- Application and Adaptation of the Model
- Related Work
- Conclusion
- References
- Similarity, Variations, Configuration
- Local Behavior Similarity
- Introduction
- Motivation
- Preliminaries
- Local Behavior Similarity
- Related Work
- Conclusion
- References
- Towards Customer-Individual Configurations of Business Process Models
- Introduction
- Defining Component Models
- Hierarchical Dependencies
- Logical Dependencies
- Temporal Dependencies
- Graphical Representation
- Configuration
- Component Selection and Cardinality Evaluation
- Evaluate Logical Dependencies
- Evaluate Temporal Dependencies
- Procedural Process Transformation
- Related Work
- Evaluation and Conclusions
- References
- Identifying and Classifying Variations in Business Processes
- Introduction
- Framework for Variation Drivers
- Definitions
- Theoretical Foundation of Variation Drivers Framework
- Driver Elicitation Method
- Classes of Drivers
- Validation
- Background
- Analysis of the Collection of Process Models Using Our Framework
- Findings
- Related Work
- Conclusion
- References
- Humans and Business Process Models
- Modeling Styles in Business Process Modeling
- Introduction
- Backgrounds
- The Process of Process Modeling
- Capturing Events of the Process of Process Modeling
- Quantifying the Process of Process Modeling
- Clustering
- Data Collection
- PPM Profile for Clustering
- Clustering
- Results
- Three Clusters
- Applying Measures
- Discussion
- Cluster C1
- Cluster C2
- Cluster C3
- Lessons Learned
- Limitations
- Related Work
- Summary
- References
- Expressiveness and Understandability Considerations of Hierarchy in Declarative Business Process Models
- Introduction
- Background: Declarative Processes
- Discussion of Semantics
- Using Hierarchy in Declarative Models
- Running Example
- Preconditions for Using Sub-Processes
- Enhanced Expressiveness
- Impact on Adaptation
- Model Understandability
- Framework for Assessing Understandability
- Impact of Idiosyncrasies on Understandability
- Discussion
- Related Work
- Summary and Outlook
- References
- Integrating Ordinary Users into Process Management: Towards Implementing Bottom-Up, People-Centric BPM
- Introduction: BPM and Stakeholder Integration
- Bottom-Up, People-Centric Processes in BPM: A Comparison
- A Walk on the W Wild (User) Side: Two Empirical Studies for r the Exploration of Stakeholder Involvement into BPM
- Study 1: Non-expert Usage of Process Models in Practice
- Study 2: Non-expert Modelers Specification of Processes
- Five Proposals for the Implementation of Stakeholder Involvement into BPM
- Related Work
- Conclusion and Further Work
- References
- BPM Technologies Using Computational Methods
- Optimized Time Managementfor Declarative Workflows
- Introduction
- Application Example
- Background
- Constraint-Based Process Models
- Scheduling, Planning and Constraint Programming
- TConDec-R: Temporal Constraint-Based Process Language
- From TConDec-R to Optimized Enactment Plans
- COP Model for TConDec-R Specifications
- Filtering Rules
- Search Algorithms
- Empirical Evaluation
- Experimental Design
- Experimental Results and Data Analysis
- Discussion and Limitations
- Related Work
- Conclusions and Future Work
- References
- MobiQ: Mobile Based Processes for Efficient Customer Flow Management
- Introduction
- Related Work
- E-Tickets for Purchasing
- Customer Flow Management
- SMS Based Solution for Information Services
- Time Management Using Mobile Devices
- Customer Flow Management Extending to Mobile Devices
- Theoretical Background
- Functionality and Prototype
- Web Services for Serving Requests from the Website and the Mobile Local Application
- E-Ticket Structure
- Websites
- Locally Stored Mobile Application
- SMS Server Application
- Evaluation Proc cess and Outcome
- Conclusions and Future Work
- References
- Enabling Probabilist ic Process Monitoring in Non-automated Environments
- Introduction
- Preliminaries
- Related Work
- Statistical Process Analysis
- Simulation Based Systems
- ProcessMining
- Other Monitoring Approaches
- Monitoring with Missing Monitoring Points
- Monitoring Sequences with Missing Monitoring Points
- Monitoring Choices with Missing Monitoring Points
- Monitoring Parallelism with Uncertainty
- Uncertainty Update
- Applicability Evaluation
- Conclusion
- References
- Business Process in the Cloud (2)
- Raw Materials for Business Processes in Cloud
- Introduction
- Nature of Regulations
- Relationships between Business Processes and Regulations
- Providing Process Raw Materials
- Related Works
- Conclusions
- References
- EMMSAD
- Modeling of Enterprise Architecture
- Model-Driven Strategic Awareness: From a Unified Business Strategy Meta-Model (UBSMM) to Enterprise Architecture
- Introduction
- Schema Integration (UBSMM)
- Pre-integration
- Schema Comparison
- Conforming to Schemata
- Schema Merging and Restructuring
- Aligning UBSMM to Enterprise Architecture
- Conceptual Relationships between UBSMM and Enterprise Architecture
- Usage Scenarios
- Related Work
- Conclusion and Future Work
- References
- On Transforming DEMO Models to ArchiMate
- Introduction
- Modelling Insurance Transactions and Processes in
- DEMO
- ArchiSurance: Selling Car Insurance via Insurance Brokers
- The DEMO
- Meta-model and Transaction Model
- From an ArchiSurance Transaction Model to a Process Model
- Translating DEMO
- Process Models to ArchiMate
- The ArchiMate Business Layer Meta-model
- Mapping the DEMO
- Meta-model to the ArchiMate
- Tool Implementation
- Related Work
- Discussions and Conclusion
- References
- Modeling Facts and Rules
- Form-and-Fact Based Modeling
- Introduction
- From Forms to Conceptual Data Models
- Screen Transition Diagrams
- Page Interaction
- Screen Transition Diagram Example
- Modal Dependencies
- Decomposition of Screen Transition Diagrams
- Mapping Conceptual Models to Forms
- Conclusion
- References
- A Framework for Relating Business Constraints to Information Systems
- Introduction
- Towards a More Generic Approach to Information-System Development
- The Organizational Need
- The Use of Models
- A Generic Structure
- An Outline Process for Constructing Information Systems
- Unpacking the "Levels" for a More-Adequate Modeling of Business Constraints
- Business Constraints and Domains in This Framework
- Value of Such a Categorization-Scheme
- Conclusions
- References
- Business Process Modeling
- Perspectives to Process Modeling - A Historical Overview
- Introduction
- Application of Process Modeling
- Perspectives to Modeling
- Perspectives to Process Modeling
- Process Modeling According to the Behavioral Perspective
- Process Modeling According to the Functional Perspective
- Process Modeling According to the Structural Perspective
- Process Modeling According to the Goal and Rule Perspective
- Process Modeling According to the Object-Oriented Perspective
- Process Modeling According to the Communication Perspective
- Process Modeling According to the Actor and Role Perspective
- Process Modeling According to the Topological Perspective
- Concluding Remarks
- References
- On the Dynamic Configuration of Business Process Models
- Introduction
- Conceptual Fram mework and Background
- NFR-Driven Configuration of Business Process
- Approach Evaluation
- Related Work
- Conclusions and Future Work
- References
- Modeling of Non-functional Requirements
- A Combined Process for Elicitation and Analysis of Safety and Security Requirements
- Introduction
- Related Work
- Combined Harm Assessment of Safety and Security for Information Systems - The CHASSIS Method
- Related Modelling Techniques
- The CHASSIS Method
- Desktop Example: ATM (Remote) Tower
- Background
- Applying CHASSIS
- Discussion
- Rationale behind CHASSIS
- Initial Feedback and Preliminary Findings
- Conclusions and Further Work
- References
- Optimizing Monitoring Requirements in Self-adaptive Systems
- Introduction
- Background: Contextual Goal Model
- Context Dependency
- SAT-Based Redundancy Elimination
- Greedy Strategies for Cost Reduction
- Finding an Optimal Solution and Reducing Multiple Dependent Contexts
- Discussion and Future Work
- References
- Safety Modeling and Analysis
- Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases
- Introduction
- Research Questions
- Related Work
- Experiment Design
- General Considerations
- The Use Case Experiment
- The System Diagram Experiment
- Results and Analyses
- Experiment Results Coding
- Effect Size and Sample Sizes
- RQ1 - Method User Friendliness
- RQ2 - Hazard Identification
- RQ3 - Method Efficiency
- Threats to Validity
- Conclusions and Further Work
- References
- Towards Tool Support for Design and Safety Analysis of High Consequence Arming Systems Using Matlab
- Introduction
- Requirements and Context
- Modelling and Execution Process
- Component Models
- Insults
- System Topology
- Path Generation
- Insult Propagation
- Example Application
- Manual Analysis
- Simulation Results and Analysis
- Discussion
- Future Work
- Related Work
- Conclusions
- References
- Quality of Models and Modeling Languages
- Towards the Reconstruction and Evaluation of Conceptual Model Quality Discourses - Methodical Framework and Application in the Context of Model Understandability
- Introduction
- Model Quality - State of the Art
- Methodical Framework for the Reconstruction and
- Evaluation of Conceptual Model Quality Discourses
- Basic Concepts
- Procedure Model for the Reconstruction and Evaluation of Conceptual Model Quality Discourses
- Application of the Methodical Framework in the Context of
- Conceptual Model Understandability
- Identification and Selection of the Model Quality Discourse
- Reconstruction of the Model Quality Discourse
- Validation of Reconstruction
- Analysis and Evaluation of the Model Quality Discourse
- Overall Assessment
- Conclusion and Outlook
- References
- Semiotic Considerations for the Design of an Agent-Oriented Modelling Language
- Introduction
- Design Considerations for the Concrete Syntax of a Modelling
- Previous Proposal
- Initial Proposal for FAML Notation
- First Proposal for FAML Notation
- Revised Proposal for FAML Notation
- Further Iterations and Possible Revisions
- Summary and Future Work
- References
- Supporting the Learning of Conceptual Modeling
- Technology-Enhanced Support for Learning Conceptual Modeling
- Educational Context
- Problem Domain
- Related Work
- Diagnostic Testing
- Adapted Modeling Tool
- Validation through Simulation
- MDA-Based Protot typing with Merode
- Relationships betw een Model and Prototype
- Increased Transparency between Model and Prototype
- Evaluation and Experiences
- Future Directions
- References
- Author Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.