Modeling Business Processes with “Building Blocks”

Author(s):  
A. Di Leva ◽  
P. Laguzzi
2010 ◽  
pp. 628-643
Author(s):  
Spiros Alexakis ◽  
Markus Bauer ◽  
András Balogh ◽  
Akos Kiss

The research project FUSION aims at supporting collaboration and interconnection between enterprises with technologies that allow for the semantic fusion of heterogeneous service-oriented business applications. The resulting FUSION approach is an enterprise application integration (EAI) conceptual framework proposing a system architecture that supports the composition of business processes using semantically annotated Web services as building blocks. The approach has been validated in the frame of three collaborative commercial proof-of-concept pilots. The chapter provides an overview on the FUSION approach and summarises our integration experiences with the application of the FUSION approach and tools during the implementation of transnational career and human resource management services.


Author(s):  
Juan Manuel Adán-Coello

Service-oriented computing (SOC) is a new computing paradigm that uses services as building blocks to accelerate the development of distributed applications in heterogeneous computer environments. SOC promises a world of cooperating services where application components are combined with little effort into a network of loosely coupled services for creating flexible and dynamic business processes that can cover many organizations and computing platforms (Chesbrough & Spohrer, 2006; Papazoglou & Georgakopoulos, 2003). From a technical point of view, the efforts to offer services have focused on the development of standards and the creation of the infrastructure necessary to describe, discover, and access services using the Web. This type of service is usually called a Web service. The availability of an abundant number of Web services defines a platform for distributed computing in which information and services are supplied on demand, and new services can be created (composed) using available services. Nevertheless, the composition of Web services involves three fundamental problems (Sycara, Paolucci, Ankolekar, & Srinivasan, 2003): 1. To elaborate a plan that describes how Web services interact, how the functionally they offer can be integrated to provide a solution to the considered problem. 2. To discover Web services that accomplish the tasks required by the plan. 3. To manage the interaction of the chosen services. Problems 2 and 3 are of responsibility of the infrastructure that supports the composition of services, while the first problem is of responsibility of the (software) agents that use the infrastructure. The discovery and interaction of Web services poses two main challenges to the infrastructure: 1. How to represent Web services capabilities and how to recognize the similarities between service capabilities and the required functionalities. 2. How to specify the information a Web service requires and provides, the interaction protocol, and the low-level mechanisms required to service invocation.


Author(s):  
Spiros Alexakis ◽  
Markus Bauer ◽  
András Balogh ◽  
Akos Kiss

The research project FUSION aims at supporting collaboration and interconnection between enterprises with technologies that allow for the semantic fusion of heterogeneous service-oriented business applications. The resulting FUSION approach is an enterprise application integration (EAI) conceptual framework proposing a system architecture that supports the composition of business processes using semantically annotated Web services as building blocks. The approach has been validated in the frame of three collaborative commercial proof-of-concept pilots. The chapter provides an overview on the FUSION approach and summarises our integration experiences with the application of the FUSION approach and tools during the implementation of transnational career and human resource management services.


2021 ◽  
Vol 12 ◽  
Author(s):  
Virginia Barba-Sánchez ◽  
Luis Orozco-Barbosa ◽  
Enrique Arias-Antúnez

Smart City initiatives across the globe have spurred increasing demand for high-skilled workers. The digital transformation, one of the main building blocks of the Smart City movement, is calling for a workforce prepared to develop novel business processes. Problem-solving, critical and analytical thinking are now the essential skills being looked at by employees. The development of the so-called STEM curriculum, Science, Technology, Engineering, and Mathematics is being given a lot of attention by educational boards in response to preparing young generations for the Smart City work market. Based on the IMD Smart City Index, PISA, and World Bank reports, we develop a model for assessing the impact of the IT secondary school capacities on Smart-City business developments. The model reveals the relationship between the technological capacity of the secondary-school, and the business activity of a Smart City. Moreover, the study shows the existence of a positive relationship between the IT capacity of secondary schools and the resulting entrepreneurial activity of the city. Our results are of interest to decision-makers and stakeholders responsible for designing educational policies and agents involved in the digital transformation and development of Smart Cities initiatives.


Author(s):  
Alejandro Reyes ◽  
Otto Huisman

Workflows are the fundamental building blocks of business processes in any organization today. These workflows have attributes and outputs that make up various Operational, Management and Supporting processes, which in turn produce a specific outcome in the form of business value. Risk Assessment and Direct Assessment are examples of such processes; they define the individual tasks integrity engineers should carry out. According to ISO 55000, achieving excellence in Asset Management requires clearly defined objectives, transparent and consistent decision making, as well as a long-term strategic view. Specifically, it recommends well-defined policies and procedures (processes) to bring about performance and cost improvements, improved risk management, business growth and enhanced stakeholder confidence through compliance and improved reputation. In reality, such processes are interpreted differently all over the world, and the workflows that make up these processes are often defined by individual engineers and experts. An excellent example of this is Risk Assessment, where significant local variations in data sources, threat sources and other data elements, require the business to tailor its activities and models used. Successful risk management is about enabling transparent decision-making through clearly defined process-steps, but in practice it requires maintaining a degree of flexibility to tailor the process to the specific organizational needs. In this paper, we introduce common building blocks that have been identified to make up a Risk Assessment process and further examine how these blocks can be connected to fulfill the needs of multiple stakeholders, including data administrators, integrity engineers and regulators. Moving from a broader Business Process view to a more focused Integrity Management view, this paper will demonstrate how to formalize Risk Assessment processes by describing the activities, steps and deliverables of each using Business Process Model and Notation (BPMN) as the standard modeling technique and extending it with an integrity-specific notation we have called Integrity Modelling Language or IML. It is shown that flexible modelling of integrity processes based on existing standards and best practices is possible within a structured approach; one which guides users and provides a transparent and auditable process inside the organization and beyond, based on commonalities defined by best practice guidelines, such as ISO 55000.


Author(s):  
Gwen L. Kolfschoten ◽  
Robert O. Briggs ◽  
Gert-Jan de Vreede

As many business processes are collaborative in nature, process leaders or process managers play a pivotal role designing collaboration processes for organization. To support the design task of creating a new collaborative business process, best practices or design patterns can be used as building blocks. For such purposes, a library of design patterns and guidelines would be useful, not only to capture the best practices for different activities in the process in a database, but to also offer the users of this database support in selecting and combining such patterns, and in creating the process design. This chapter describes the requirements for a tool for pattern based collaboration process design, specifically for design efforts following the Collaboration Engineering approach.


Author(s):  
Pethuru Raj Chelliah

With the noteworthy spurt of service orientation (SO) principles, the spur and surge for composition paradigm have taken a fabulous and fruitful dimension and perspective. Composites are emerging and establishing as the promising, proven and potential building-blocks in the pulsating ICT space. Enterprises are very optimistic and sensitive about the shining days of composites in their day-to-day dealings and obligations to their restive partners, government agencies, venerable customers, demanding end-users, and loyal employees. In short, composites are bound to increasingly and illuminatingly participate and contribute towards fulfilling the goals of realizing integrated, optimized, smart and lean business processes that in turn can lead to extended, connected, adaptive, and on-demand businesses. As next-generation ICT is presumed to thrive on spontaneous and seamless collaboration among systems, services, servers, sensors, etc. by sending messages as well as smartly sharing a wider variety of connected and empowered resources, there arises a distinct identity and value for progressive, penetrative and pervasive composites. Already we started to read, hear and experience composite applications, services, and views. As composition is to flower and flourish in a positive fashion, the future IT is definitely on right track. In this chapter, you can find discussions about how rapidly and smoothly services enable business-aligned composites realization. There are sections dealing with prominent composition paradigms, patterns, platforms, processes, practices, products, perspectives, problems and potentials.


Author(s):  
Wenbing Zhao

Information systems are essential building blocks in any business or institution. They can be used to automate most business processes and operations. In the Internet age, virtually all such systems are accessible online, and many of them are interconnected. This mandates that such systems be made highly secure and dependable.


2010 ◽  
Vol 4 (3) ◽  
pp. 1-21
Author(s):  
Munir Majdalawieh

This paper discusses the challenges that faced in the “DigNet” age in terms of privacy and proposes a framework for privacy protection. This framework is integral in ensuring that personal data protection is impeded part of business processes of any systems that are involved in collecting, disseminating, and accessing an individual’s data. The cooperation and partnership between nations in passing privacy laws is essential and requires some building blocks. In this paper, the author argues that the building blocks should be integrated into the business processes and take into consideration three main domains: governments’ legislation, entity’s policies and procedures, and data protection controls. The proposed conceptual framework helps organizations develop data protection in their business processes, assess the privacy issues in their organization, protect the interests of their customers, increase their value proposition to customers, and make it easier to identify the impact of privacy on their business.


2021 ◽  
Vol 11 (3) ◽  
pp. 226-233
Author(s):  
Amadi Chukwuemeka Augustine ◽  
Juliet Nnenna Odii ◽  
Stanley A Okolie

This paper review seeks to identify the need for a revamped data life cycle security in the era of pervasive threat from skill cyber criminals at this time of internet of things. The motivation is to fill the knowledge gap by presenting some of the ways of data leakages and the likely protection in the organization. The aim is to present a good practice that encourages data confidentiality, acceptable use policy, knowledge of personnel and physical security policy. The building blocks of information security infrastructure across the entire organization is implemented by Enterprise Security Architecture. Rather than focus on individual functional and non-functional components in an individual application, it focuses on a strategic design for a set of security services that can be leveraged by multiple applications, systems, or business processes.


Sign in / Sign up

Export Citation Format

Share Document