Extending Workflows for Knowledge Flow Automation

Author(s):  
Surendra Sarnikar ◽  
J. Leon Zhao

Effective execution of business processes also requires the provisioning of relevant knowledge to workers in various business contexts. Knowledge flow automation aims to enable seamless transfer of knowledge by supporting the capture and sharing of organizational knowledge related to business processes. Given the strong correlation between the flow of work and the flow of knowledge, workflow systems are a natural platform for supporting knowledge flow. However, existing workflow technology does not yet provide the needed mechanisms suitable for supporting knowledge flow. This chapter presents an overview of different types of workflow-based knowledge management systems that provide knowledge workers with the required knowledge while supporting the flow of work. In addition, a new perspective is presented on extending workflows to support knowledge transfer processes by introducing the concept of “knowledge workflows” and outline future research directions in this area.

2018 ◽  
Vol 31 (3) ◽  
pp. 34-53 ◽  
Author(s):  
Yu Jia ◽  
Nianxin Wang ◽  
Shilun Ge

The purpose of this article is to portray the knowledge evolution paths of business-IT alignment (BITA) research and identify a set of important papers in the development of BITA, and elucidate the intellectual structure of this field. This study collected 309 papers published during the period 1983-2015 from the Web of Science (WOS) database. Using a variety of bibliometric and visualization analytic techniques such as citation analysis, co-citation analysis and main path analysis, this article (1) delineates the significant knowledge flows of BITA research and identifies 15 important papers in this field; (2) graphically maps the influential countries, institutions, and journals of BITA research; (3) identifies four major research themes: BITA model, measurement, antecedents, and dynamics, and visualizing the relationships among them. Based on these findings, recommendations for the future research directions have suggested. This article provides IT practitioners, executives, and scholars with a new perspective to get a better understanding of BITA.


2011 ◽  
pp. 192-205
Author(s):  
Helena Halas ◽  
Tomaž Klobucar

This chapter explores the influence of pervasive computing on companies and their businesses, with the main stress on business models. The role of business models for companies is presented. Introduction to pervasive computing and a survey of existing e-business models classifications are used as a base for our research. The main characteristics of today’s business models are discussed and a method for evaluating business models characteristics is proposed. We concentrate on characteristics of pervasive computing and their influence on companies’ business processes and business models. The present and future business characteristics and business models are briefly compared, and future research directions on pervasive computing and business models are presented.


Author(s):  
Helena Halas ◽  
Tomaž Klobucar

This chapter explores the influence of pervasive computing on companies and their businesses, with the main stress on business models. The role of business models for companies is presented. Introduction to pervasive computing and a survey of existing e-business models classifications are used as a base for our research. The main characteristics of today’s business models are discussed and a method for evaluating business models characteristics is proposed. We concentrate on characteristics of pervasive computing and their influence on companies’ business processes and business models. The present and future business characteristics and business models are briefly compared, and future research directions on pervasive computing and business models are presented.


2013 ◽  
Vol 26 (4) ◽  
pp. 66-91 ◽  
Author(s):  
Virginia N. L. Franqueira ◽  
André van Cleeff ◽  
Pascal van Eck ◽  
Roel J. Wieringa

Companies are increasingly engaging in complex inter-organisational networks of business and trading partners, service and managed security providers to run their operations. Therefore, it is now common to outsource critical business processes and to completely move IT resources to the custody of third parties. Such extended enterprises create individuals who are neither completely insiders nor outsiders of a company, requiring new solutions to mitigate the security threat they cause. This paper improves the method introduced in Franqueira et al. (2012) for the analysis of such threat to support negotiation of security agreements in B2B contracts. The method, illustrated via a manufacturer-retailer example, has three main ingredients: modelling to scope the analysis and to identify external insider roles, access matrix to obtain need-to-know requirements, and reverse-engineering of security best practices to analyse both pose-threat and enforce-security perspectives of external insider roles. The paper also proposes future research directions to overcome challenges identified.


Within the last few decades, wireless connectivity has experienced an exponential growth. With far more features than 4G communications, next-generation (5G) will soon be available worldwide. In the year 2027 to 2030, the sixth- generation (6G) wireless system, fully supported by artificial intelligence, will become the dominant paradigm for wireless communication. Beyond 5G, the main factors to consider are higher system capacity, greater data rates, reduced latency, enhanced security, and improved quality of service (QoS) compared to current 5G systems. In this paper, we describe the strategy for future 6G wireless networks, emerging technologies and the architecture within which they will operate. This paper focuses on key performance indicators, applications, new services, and key technologies that could enable 6G networks. By presenting a new perspective on future research directions, this article will make a significant contribution to future research directions.


Author(s):  
Théophile Demazure ◽  
Alexander Karran ◽  
Pierre-Majorique Léger ◽  
Élise Labonté-LeMoyne ◽  
Sylvain Sénécal ◽  
...  

AbstractArguably, automation is fast transforming many enterprise business processes, transforming operational jobs into monitoring tasks. Consequently, the ability to sustain attention during extended periods of monitoring is becoming a critical skill. This manuscript presents a Brain-Computer Interface (BCI) prototype which seeks to combat decrements in sustained attention during monitoring tasks within an enterprise system. A brain-computer interface is a system which uses physiological signals output by the user as an input. The goal is to better understand human responses while performing tasks involving decision and monitoring cycles, finding ways to improve performance and decrease on-task error. Decision readiness and the ability to synthesize complex and abundant information in a brief period during critical events has never been more important. Closed-loop control and motivational control theory were synthesized to provide the basis from which a framework for a prototype was developed to demonstrate the feasibility and value of a BCI in critical enterprise activities. In this pilot study, the BCI was implemented and evaluated through laboratory experimentation using an ecologically valid task. The results show that the technological artifact allowed users to regulate sustained attention positively while performing the task. Levels of sustained attention were shown to be higher in the conditions assisted by the BCI. Furthermore, this increased cognitive response seems to be related to increased on-task action and a small reduction in on-task errors. The research concludes with a discussion of the future research directions and their application in the enterprise.


Sign in / Sign up

Export Citation Format

Share Document