Managing BPM life cycle transition risks in a small educational company to support change management

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Larissa Ane Hora de Souza ◽  
Victor Diogho Heuer de Carvalho ◽  
Roberio José Rogério dos Santos ◽  
Jonhatan Magno Norte da Silva

PurposeThis article aims to present a methodology applied to the transition between the “as-is” and “to-be” stages of the Business Process Management (BPM) life cycle, supporting its implementation and maintenance for the organizational stability, using techniques from Operations Research and Information and Decision Theories, applied by a gamified system.Design/methodology/approachThe study used Design Science Research, considering the following methodological elements: (1) artifact model, after initial analysis of the organization; (2) problem relevance, incorporating components to the Markov transition matrix and the integer programming model for resource optimization; (3) model evaluation, establishing mechanisms to validate the methodology created; (4) research contributions, showing benefits found; (5) systematic approach, detailing methods used; (6) model's research process, revealing the means for execution; and (7) final presentation of results.FindingsAfter planning three scenarios for the company, containing zero, one or two implemented processes, the matrix of states in the Markov chain effectively identified the states of greater and lesser transition uncertainty. At the same time, the optimization model guided the organization toward a stable change in its operational and financial areas.Practical implicationsThe company's planning capacity has increased, as its managers now have a methodology to promote rational decisions about the development of plans. Before, managers believed that the methodology used was only for large companies. However, this view changed with the results, showing a structured view of the ability to absorb new customers, relocate established ones, increase the comfort level for employees and increase profitability for the company's business.Originality/valueThe study showed that the combination of techniques opens a new perspective to the incorporation of BPM in organizations, allows a smooth change between the current and future state, making it possible to predict the evolution of transition scenarios.

2020 ◽  
Vol 22 (3) ◽  
pp. 227-244
Author(s):  
João Serrado ◽  
Ruben Filipe Pereira ◽  
Miguel Mira da Silva ◽  
Isaías Scalabrin Bianchi

Purpose Data can nowadays be seen as the main asset of organizations and data leaks have a considerable impact on the organization’s image, revenues and possible consequences to the affected clients. One of the most critical industries is the bank. Information security frameworks (ISF) have been created to assist organizations and other frameworks evolved to update these domain practices. Recently, the European Union decided to create the general data protection regulation (GDPR), applicable to all organizations dealing with personal data of citizens residing in the European Union. Although considered a general regulation, GDPR implementation needs to align with some industries’ laws and policies. Especially in the Bank industry. How these ISF can assist the implementation of GDPR is not clear. Design/methodology/approach The design science research process was followed and semi-structured interviews performed. Findings A list of practices to assist the bank industry in GDPR implementation is provided. How each practice map with assessed ISF and GDPR requirements is also presented. Research limitations/implications As GDPR is a relatively recent subject, it is hard to find experts in the area. It is more difficult if the authors intend to find experienced people in the GDPR and bank industry. That is one of the main reasons this study does not include more interviews. Originality/value This research provides a novel artefact to the body of knowledge. The proposed artefact lists which ISF practices banks should implement to comply with GDPR. By doing it the artefact provides a centralized view about which ISF frameworks (or part of them) could be implemented to help banks comply with GDPR.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Fuad Sameh Alshraiedeh ◽  
Norliza Katuk

Purpose Many REpresentational State Transfer (RESTful) Web services suffered from anti-patterns problem, which may diminish the sustainability of the services. The anti-patterns problem could happen in the code of the programme or the uniform resource identifiers (URIs) of RESTful Web services. This study aims to address the problem by proposing a technique and an algorithm for detecting anti-patterns in RESTful Web services. Specifically, the technique is designed based on URIs parsing process. Design/methodology/approach The study was conducted following the design science research process, which has six activities, namely, identifying problems, identifying solutions, design the solutions, demonstrate the solution, evaluation and communicate the solution. The proposed technique was embedded in an algorithm and evaluated in four phases covering the process of extracting the URIs, implementing the anti-pattern detection algorithm, detecting the anti-patterns and validating the results. Findings The results of the study suggested an acceptable level of accuracy for the anti-patterns detection with 82.30% of precision, 87.86% of recall and 84.93% of F-measure. Practical implications The technique and the algorithm can be used by developers of RESTful Web services to detect possible anti-pattern occurrences in the service-based systems. Originality/value The technique is personalised to detect amorphous URI and ambiguous name anti-patterns in which it scans the Web service URIs using specified rules and compares them with pre-determined syntax and corpus.


2015 ◽  
Vol 21 (6) ◽  
pp. 1224-1256 ◽  
Author(s):  
Roberto dos Santos Rocha ◽  
Marcelo Fantinato ◽  
Lucinéia Heloisa Thom ◽  
Marcelo Medeiros Eler

Purpose – The purpose of this paper is to present the proposal of a Product Line (PL)-based approach for Business Process Management (BPM) projects that cover the entire BPM lifecycle and proposes integrating it with dynamic techniques still not used together. Design/methodology/approach – The authors carried out this work using the design science research methodology. The authors assessed the proposed approach using a classification procedure created through a series of specific attributes, which enables a comparison of the proposed integrated approach with related works selected from a systematic literature review. Findings – The comparative assessment has shown that the proposed approach presents the most comprehensive solution than any other similar one suggested for the same purpose, mainly in terms of the coverage of the entire BPM lifecycle and dynamic techniques. Research limitations/implications – Due to the high-level conceptual nature of the proposed approach, the authors could not evaluate it also in terms of some controlled experiment or a case study. Originality/value – The proposed approach aims at improving the management of business processes in organizations in a systematic way using concepts and techniques that exist in other areas, but not widely used together yet, such as BPM, service-oriented computing, and Software PL.


2018 ◽  
Vol 24 (4) ◽  
pp. 985-1006 ◽  
Author(s):  
Sarra Mamoghli ◽  
Luc Cassivi ◽  
Sylvie Trudel

Purpose The purpose of this paper is to assist organizations in the assessment of both information technology (IT) and human factors required to support their business processes (BPs) by taking into account the interdependence and alignment of these factors, rather than considering them independently. Design/methodology/approach A design science research methodology was followed to build a maturity model (MM) enabling this assessment. The proposed design process is composed of four steps: problem identification, comparison of 19 existing MMs in business process management (BPM), iterative model development, and model evaluation. The last two steps were specifically based on three research methods: literature analysis, case studies, and expert panels. Findings This paper presents a MM that assigns a maturity level to an organization’s BPs in two assessment steps. The first step evaluates the level of sophistication and integration of the IT systems supporting each BP, while the second step assesses the alignment of human factors with the technological efforts. Research limitations/implications The research was conducted with SMEs, leading to results that may be specific to this type of organization. Practical implications Practitioners can use the proposed model throughout their journey toward process excellence. The application of this model leads to two main process improvement scenarios: upgrading the sophistication and integration of the software technologies in support of the processes, and improving the cohesion of the resources the organization already owns (human and IT resources). Originality/value The proposed MM constitutes a first step in the assessment of the interdependence between the factors influencing BPM.


2014 ◽  
Vol 20 (2) ◽  
pp. 213-246 ◽  
Author(s):  
Christian Sonnenberg ◽  
Jan vom Brocke

Purpose – The purpose of this paper is to integrate business process management (BPM) and accounting on a conceptual level in order to account for the economic implications of process-state changes in process design-time and process run-time. Design/methodology/approach – The paper adopts a design science research paradigm. The research, grounded in an “events” approach to accounting theory, builds on the REA accounting model that has been adapted for the design of a process accounting model (PAM). Findings – The paper presents a PAM that can be used to structure event records in process-aware information systems (PAIS) to enable process-oriented accounting. The PAM is specified as a light weight data structure that is intended for the integration of PAIS and accounting information systems. Research limitations/implications – As this paper is technical in nature, more research is needed to evaluate more thoroughly its approach in naturalistic settings. Practical implications – The PAM can support traditional accounting approaches, and because of the adopted events approach, it readily supports use cases related to real-time analytics in BPM and accounting. Originality/value – The PAM presents a novel approach to integrating BPM and accounting. The novelty of this approach lies in its use of event records to document flows of economic resources.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Shong-lee Ivan Su ◽  
Xuemei Fan ◽  
Yongyi Shou

PurposeThe study aims to explore and develop a smart route planning system for the cross-docking delivery operations of a large supermarket chain using an action research (AR) approach and assessing through a design science research (DSR) lens.Design/methodology/approachThis study took a problem-solving AR (PAR) approach toward the delivery operational issue of the case firm. The research process has accorded with the solution incubation and the refinement phases defined by a DSR framework. An intervention-based research framework for DSR is developed to assess the validity of this study as a DSR research and derive mid-range theories.FindingsDramatic operational and financial improvements were achieved for the case firm. Significant and unintended environmental and social benefits were also found. A design proposition (DP) and several mid-range theories are proposed as an extension of AR research to DSR research.Research limitations/implicationsA problem-solving DSR research can be better assessed by the intervention-based DSR framework developed in this study. DSR studies should be encouraged for both practical and theoretical advancement purposes.Practical implicationsA challenging business problem-solving study can be tackled effectively through an industry/academic collaboration taking a PAR approach to deliver substantial values and organization transformational results.Social implicationsDrivers and store associates are safer with smart delivery operations in the case firm.Originality/valueThere are still limited PAR design science case studies in the supply chain/logistics research literature. The research experience and findings gained from this study provide more insights toward how this type of research can be conducted and assessed.


2019 ◽  
Vol 32 (3) ◽  
pp. 477-495 ◽  
Author(s):  
Johannes Zrenner ◽  
Frederik Oliver Möller ◽  
Christian Jung ◽  
Andreas Eitel ◽  
Boris Otto

Purpose Current business challenges force companies to exchange critical and sensitive data. The data provider pays great attention to the usage of their data and wants to control it by policies. The purpose of this paper is to develop usage control architecture options to enable data sovereignty in business ecosystems. Design/methodology/approach The architecture options are developed following the design science research process. Based on requirements from an automotive use case, the authors develop architecture options. The different architecture options are demonstrated and evaluated based on the case study with practitioners from the automotive industry. Findings This paper introduces different architecture options for implementing usage control (UC). The proposed architecture options represent solutions for UC in business ecosystems. The comparison of the architecture options shows the respective advantages and disadvantages for data provider and data consumer. Research limitations/implications In this work, the authors address only one case stemming from the German automotive sector. Practical implications Technical enforcement of data providers policies instead of relying on trust to support collaborative data exchange between companies. Originality/value This research is among the first to introduce architecture options that provide a technical concept for the implementation of data sovereignty in business ecosystems using UC. Consequently, it supports the decision process for the technical implementation of data sovereignty.


2019 ◽  
Vol 42 (1) ◽  
pp. 141-154
Author(s):  
Mónica Ramos-Mejía ◽  
Juan Manuel Jauregui-Becker ◽  
Marlies Koers-Stuiver ◽  
María-Laura Franco-Garcia

Purpose This paper aims at explaining the design process of a learning model targeting potential entrepreneurs with no technical or business expertise aiming to develop sustainable business models in deprived areas. The case that the paper explores focuses on experiential learning and learning in adulthood to design a learning model that considers context and socio-demographic characteristics, makes clear the interconnections between sustainability principles, entrepreneurship rationale and design methodologies and includes actions and processes of reflection and contextual interaction. Design/methodology/approach Following a recursive argument, the paper applies design research methodology (DRM) to systematically design the “transformative innovation model” that Product Co Creation Centers (PC3) from the University of Twente (The Netherlands) has developed. Findings Building on Kolb’s cycle of experiential learning, the result of applying DRM is a learning cycle of confrontation, observation, practice and application. The proposed learning model is applied to a specific setting in Colombia, allowing to verify and validate whether the learning model leads to the expected outcomes. It is argued that an interdisciplinary approach, a focus on feedback loops and the consideration of the context are important elements for addressing and transforming complex problems related to sustainable development from the bottom-up. Originality/value This paper contributes to academic research in management emphasizing a solution-finding approach based on a prescription-driven research process, informed by design science research.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Michele Colli ◽  
Jonas Nygaard Uhrenholt ◽  
Ole Madsen ◽  
Brian Vejrum Waehrens

PurposeThis research proposes and demonstrates a framework that can be used to systematically address the idiosyncratic design of Internet of Things (IoT)-based solutions, and to match the explorative aspects of introducing a new technology to the exploitative needs, to improve the performance of production operations.Design/methodology/approachDue to the applied nature of this research, a design science research (DSR) framework was adopted in order to ensure both the rigor and applicability of the outcomes.FindingsA process excellence perspective, operationalized through a business process management approach, is applied to scope the solution space according to its exploitative potential. The mapping of the information flow that needs to be established defines the technological infrastructure of the solution.Research limitations/implicationsThe theoretical generalizability of the proposed framework is limited by a testing sample of a single case. The research implications are related to a call for the contextualization of IoT applications. Further research will involve the application of this approach to a diverse range of industrial settings. While the domain is far from saturated, a framework that can facilitate such investigations has been provided.Practical implicationsThe proposed framework provides practitioners with an approach to designing IoT solutions that can consistently address their needs for operational performance improvements.Originality/valueThis research proposes a framework that links the enabling of transparency via the integration of IoT in production operations to contextual characteristics and business potential. Furthermore, it highlights the developmental drivers of IoT solutions, which emerged during the empirical demonstration of this framework.


Sign in / Sign up

Export Citation Format

Share Document