Testing Complex and Dynamic Business Processes

Author(s):  
Krishnendu Kunti ◽  
Bijoy Majumdar ◽  
Terrence Bernard Dias

In this chapter we deal with testing of business processes implemented using computer systems. We have discussed challenges associated with business process testing, identified aspects of business processes that need to be tested and capabilities that the testing tool(s) or environment should have in order to perform such testing. The chapter also discusses a commonly used software testing methodology in light business process testing for provisioning of structured mechanism for business process testing. One of the aspects of managing complex and dynamic business processes is making sure that the process delivers what is required of it at all times. Dynamics of the business may require frequent changes in the business process and whenever such changes takes place there is a need to test the process thoroughly to ascertain that the process is still working according to the requirements laid down for it. This becomes even more important if the business process is implemented using computer systems since over a period of time the computer software becomes more prone to error as it is updated frequently to accommodate the business changes hence the requirement for testing complex business processes.

Author(s):  
Bibit - Sudarsono ◽  
Umi - Faddillah

Printing service order information systems sometimes experience problems in completing running business processes including, frequent loss and inaccuracy in registering orders from customers, often also losing order data from customers, recording orders often experience errors, resulting inaccurate reporting of order data. A computerized ordering service information system will greatly help improve performance and accuracy in making reports on business processes running at a company. The existence of enterprise modeling of information systems ordering printing services with the TOGAF framework will be a method that greatly helps management make a decision that will synergize with the business process activities at the company. So that the objectives of the system can be achieved properly. The TOGAF framework can be a solution and will help to produce a system architecture design, a business process architecture, a technology architecture, a number of proposed business opportunity strategy proposals and an ongoing system change proposal.


2020 ◽  
Vol 23 (11) ◽  
pp. 1269-1290
Author(s):  
A.A. Turgaeva

Subject. This article analyzes the business processes in the insurance company, using the method of their operation with the selection of key areas of activity. Objectives. The article aims to describe certain business processes in insurance, highlighting participants, lines of activity, and the sequence of procedures. It analyzes the business process Settlement of Losses, which is one of the significant business processes in the insurance company. Methods. For the study, I used the methods of induction and deduction, analogy, and the systems approach. Results. Based on the analysis and description of business processes in the insurance company and the identification of key elements and steps in terms of the effectiveness of decisions, the article identifies the checkpoints of Entry and Exit, activity direction, and resources of the Settlement of Losses process. Conclusions. The application of the categories that split business processes makes it possible to develop step regulation for all processes and acceptable control procedures for different operations. The presented checkpoints at different steps of the business process will help identify weaknesses and eliminate them by re-checking the point.


Author(s):  
Matteo Zavatteri ◽  
Carlo Combi ◽  
Luca Viganò

AbstractA current research problem in the area of business process management deals with the specification and checking of constraints on resources (e.g., users, agents, autonomous systems, etc.) allowed to be committed for the execution of specific tasks. Indeed, in many real-world situations, role assignments are not enough to assign tasks to the suitable resources. It could be the case that further requirements need to be specified and satisfied. As an example, one would like to avoid that employees that are relatives are assigned to a set of critical tasks in the same process in order to prevent fraud. The formal specification of a business process and its related access control constraints is obtained through a decoration of a classic business process with roles, users, and constraints on their commitment. As a result, such a process specifies a set of tasks that need to be executed by authorized users with respect to some partial order in a way that all authorization constraints are satisfied. Controllability refers in this case to the capability of executing the process satisfying all these constraints, even when some process components, e.g., gateway conditions, can only be observed, but not decided, by the process engine responsible of the execution. In this paper, we propose conditional constraint networks with decisions (CCNDs) as a model to encode business processes that involve access control and conditional branches that may be both controllable and uncontrollable. We define weak, strong, and dynamic controllability of CCNDs as two-player games, classify their computational complexity, and discuss strategy synthesis algorithms. We provide an encoding from the business processes we consider here into CCNDs to exploit off-the-shelf their strategy synthesis algorithms. We introduce $$\textsc {Zeta}$$ Z E T A , a tool for checking controllability of CCNDs, synthesizing execution strategies, and executing controllable CCNDs, by also supporting user interactivity. We use $$\textsc {Zeta}$$ Z E T A to compare with the previous research, provide a new experimental evaluation for CCNDs, and discuss limitations.


2017 ◽  
Vol 12 (3) ◽  
pp. 161
Author(s):  
Andy Lieman Candra

AbstrakSekretariat Fakultas Sains dan Teknologi Universitas Ma Chung merupakan fakultas dimana Penulis melakukan penelitian. Tujuan dari penelitian ini adalah untuk menganalisis proses bisnis yang ada di Sekretariat Fakultas Sains dan Teknologi Universitas Ma Chung berdasarkan dari hasil wawancara dengan beberapa stakeholder yang memiliki kebutuhan ataupun keluhan terhadap setiap proses bisnis yang berjalan, mengidentifikasi permasalahan dari proses bisnis yang kurang efisien dan membuat usulan perbaikan untuk setiap proses bisnis dengan menggunakan pendekatan ilmu Business Process Reengineering (BPR). Penulis juga menggunakan metode analisis nilai tambah pada penelitian ini. Tujuan dari penggunaan metode analisis nilai tambah adalah untuk mengkategorikan langkah maupun elemen kerja ke dalam tiga kategori, yakni value adding, business value adding dan non value adding. Pengaktegorisasian tersebut bertujuan untuk menghilangkan langkah maupun elemen kerja yang termasuk kedalam non value adding dan meminimalkan langkah maupun elemen kerja yang termasuk kedalam business value adding. Penulis mengidentikasi permasalahan setiap proses bisnis dengan menggunakan diagram sebab akibat. Diagram sebab akibat dapat menggambarkan dengan jelas mengenai permasalahan dengan faktor-faktor penyebab yang memengaruhi permasalahan di setiap proses bisnis. Hasil dari penelitian ini adalah pendesainan ulang setiap proses bisnis menurut kebutuhan dan keluhan dari stakeholder dan setiap proses bisnis di Sekretariat Fakultas Sains dan Teknologi didokumentasikan dalam bentuk standard operating procedure (SOP). AbstractSecretariat of Faculty of Science and Technology Ma Chung University is a place where the author conducts research. The purposes of this research are to analyze business processes in Secretariat of Faculty of Science and Technology Ma Chung University based on interview results with some stakeholders who have needs or complaints with ongoing business processes, identify problems of less efficient business processes and make proposed improvements for each business process using the Business Process Reengineering approach. Author also uses value added analysis method on this research. The purpose of using value added analysis method is to categorize steps or tasks in every business process into three categories: value adding, business value adding and non value adding. The categorizations aim to eliminate steps or tasks included into non value adding and minimize steps or tasks included into business value adding. Author identifies problems of each business process by using cause and effect diagram. Cause and effect diagram can clearly illustrate the problems with the underlying factors that affect the problem in each business process. The results of this research are redesigning every business processes according to the interview results with stakeholders about their needs and complaints and also every business process in Secretariat of Faculty of Science and Technology are documented in the form of standard operating procedure. Keywords: Business Process Reengineering, Value Added Analysis, Standard Operating Procedure and Cause and Effect Diagram.


2011 ◽  
Vol 58-60 ◽  
pp. 1860-1865 ◽  
Author(s):  
Samuel Lukas ◽  
Arnold Aribowo ◽  
Steven Christian Halim

Shikaku is a logic puzzle published by Nikoli at 2005. Shikaku has a very simple rule. This puzzle is played on a rectangular grid. Some of the squares in the grid are numbered. The main objective is to create partitions inside the grid. Each partition must have exactly one number, and the number represents the area of the partition. Then the partition’s shape must be a rectangular or a square. The aim of this research is discussing how can computer software be able to solve the Shikaku problem by implementing heuristic technique and genetics algorithms. Initially the Shikaku problem is inputted into the system. Firstly, the software will solve the problem by applying heuristics methods with some logic rules. All logic rules are created and implemented into the software so that the software can minimize the partitions possibilities to the problem. If this heuristics method still can not solve the problem then genetic algorithms will be executed to find the solution. This paper elaborates from how the problem be modelled and also be implemented until software testing to ensure that the solver worked as expected. The implementation consists of a virtual puzzle board with three different size, genetic algorithms parameters, and ability to create, save, load, and solve puzzle. Software testing is conducted to find how fast the system can solve the problem.


2014 ◽  
Vol 568-570 ◽  
pp. 1616-1620
Author(s):  
Min Qin ◽  
Shi Quan Qiao

At present, the enterprise has many business processes. It need transfer many forms involving personnel, procurement and other aspects. The workflow management system uses computer network to realize the automation of the business process. This paper analyses the workflow management system, describes the operational principle of the workflow engine and presents a cooperative platform design based on workflow. It can effectively track the whole process and realize standardized management. Otherwise, it can enhance the enterprise business operation efficiency.


2021 ◽  
Vol 17 (8) ◽  
pp. 1491-1518
Author(s):  
Vilena A. YAKIMOVA ◽  
Viktor S. RADOMSKII

Subject. The article focuses on organizational and methodological issues of internal compliance control in e-commerce businesses. Objectives. We refine the design and technique of internal compliance control for e-commerce businesses. Methods. The study relies upon methods of analysis and generalization, grouping, systematization, risk-based, systems and business process approaches. Results. We devised the five-component compliance control sysem, determined its principles and functions ensuring the economic security of e-commerce businesses. We suggest conducting compliance procedures intended to mitigate IT risks and accounting for the specifics of e-commerce business processes. Conclusions and Relevance. In e-commerce, compliance control serves for identifying and monitoring compliance risks, ensuring safe operations of businesses, which is vital for people. The information system for IT risk protection was found to underlie compliance control, while control procedures can be classified into general and applied. The findings can be used to set up a reliable and effective compliance system for e-commerce businesses in order to prevent economic abuses and crime.


2018 ◽  
Vol 193 ◽  
pp. 05064 ◽  
Author(s):  
Ekaterina Kuleshova ◽  
Anastasia Levina ◽  
Rustam Esedulaev

The paper describes the principle of the reengineering of supply chain management integrated scheduling processes in order to increase in efficiency of business process and decrease the decision-making time at collision of plan-fact deviations. The basic concept of business-processes reengineering is analyzed. The experience of reengineering of supply chain integrated scheduling business processes for the oil and gas branch is presented. The bottlenecks of the current practice were revealed. The purpose of this paper is to carry out recommendations for improving business processes based on an analysis of the current realization of the process, his provision with information systems and data flows.


2019 ◽  
Vol 25 (5) ◽  
pp. 908-922 ◽  
Author(s):  
Remco Dijkman ◽  
Oktay Turetken ◽  
Geoffrey Robert van IJzendoorn ◽  
Meint de Vries

Purpose Business process models describe the way of working in an organization. Typically, business process models distinguish between the normal flow of work and exceptions to that normal flow. However, they often present an idealized view. This means that unexpected exceptions – exceptions that are not modeled in the business process model – can also occur in practice. This has an effect on the efficiency of the organization, because information systems are not developed to handle unexpected exceptions. The purpose of this paper is to study the relation between the occurrence of exceptions and operational performance. Design/methodology/approach The paper does this by analyzing the execution logs of business processes from five organizations, classifying execution paths as normal or exceptional. Subsequently, it analyzes the differences between normal and exceptional paths. Findings The results show that exceptions are related to worse operational performance in terms of a longer throughput time and that unexpected exceptions relate to a stronger increase in throughput time than expected exceptions. Practical implications These findings lead to practical implications on policies that can be followed with respect to exceptions. Most importantly, unexpected exceptions should be avoided by incorporating them into the process – and thus transforming them into expected exceptions – as much as possible. Also, as not all exceptions lead to longer throughput times, continuous improvement should be employed to continuously monitor the occurrence of exceptions and make decisions on their desirability in the process. Originality/value While work exists on analyzing the occurrence of exceptions in business processes, especially in the context of process conformance analysis, to the best of the authors’ knowledge this is the first work that analyzes the possible consequences of such exceptions.


Sign in / Sign up

Export Citation Format

Share Document