A Study On Risks Involved In Using Different Business Process Tools And Techniques To Manage Them

2021 ◽  
Vol 23 (09) ◽  
pp. 221-240
Author(s):  
Amanina Fakhriah Abd Rahman ◽  
◽  
Nursyaza Elmaliyana Nabilah Ali Rahman ◽  
Siti Aisyah Abdullah Rosneddin ◽  
Siti Nur Aqilah Hamzah ◽  
...  

This paper shows the outcome of the research conducted on risks while using business process tools and techniques applied to manage them. The study aims at getting answers for basic questions about risk management, such as what kind of risks the the businesses are encountering, and how to identify the risks and assess them. Risk assessments are very important as they form an integral part of plan management. Therefore, in this study, the aim is to evaluate the risks in different business processes along with the tools and techniques to manage or minimize the level of risks by adding more control measures as necessary.

2021 ◽  
Vol 94 ◽  
pp. 01022
Author(s):  
Mariya Volik ◽  
Maria Kovaleva ◽  
Eleonora Khachaturova

In modern conditions of digitalization, each company seeks to optimize the management of activities based on modern IT. With an increase in the number of trading companies, the more becomes acute problem of attracting and retaining customers. In order to improve the efficiency activity of the company, the leadership needs to optimize the business processes of interaction with customers. The purpose of this work is to study the company's activities for the development and implementation of software, analyze the business process of interaction with clients for its automation based on CRMBitrix24. The description of the investigated business process in the notations «as is» and «to be» showed that the automation of interaction with the company's customers has a number of advantages. In this regard, in the future, it is necessary to develop a Bitrix24 implementation project, a risk management plan and assessment of the economic efficiency of the project.


Author(s):  
Alejandro Reyes ◽  
Otto Huisman

Workflows are the fundamental building blocks of business processes in any organization today. These workflows have attributes and outputs that make up various Operational, Management and Supporting processes, which in turn produce a specific outcome in the form of business value. Risk Assessment and Direct Assessment are examples of such processes; they define the individual tasks integrity engineers should carry out. According to ISO 55000, achieving excellence in Asset Management requires clearly defined objectives, transparent and consistent decision making, as well as a long-term strategic view. Specifically, it recommends well-defined policies and procedures (processes) to bring about performance and cost improvements, improved risk management, business growth and enhanced stakeholder confidence through compliance and improved reputation. In reality, such processes are interpreted differently all over the world, and the workflows that make up these processes are often defined by individual engineers and experts. An excellent example of this is Risk Assessment, where significant local variations in data sources, threat sources and other data elements, require the business to tailor its activities and models used. Successful risk management is about enabling transparent decision-making through clearly defined process-steps, but in practice it requires maintaining a degree of flexibility to tailor the process to the specific organizational needs. In this paper, we introduce common building blocks that have been identified to make up a Risk Assessment process and further examine how these blocks can be connected to fulfill the needs of multiple stakeholders, including data administrators, integrity engineers and regulators. Moving from a broader Business Process view to a more focused Integrity Management view, this paper will demonstrate how to formalize Risk Assessment processes by describing the activities, steps and deliverables of each using Business Process Model and Notation (BPMN) as the standard modeling technique and extending it with an integrity-specific notation we have called Integrity Modelling Language or IML. It is shown that flexible modelling of integrity processes based on existing standards and best practices is possible within a structured approach; one which guides users and provides a transparent and auditable process inside the organization and beyond, based on commonalities defined by best practice guidelines, such as ISO 55000.


Author(s):  
Bashar Shahir Ahmed ◽  
Fadi Amroush ◽  
Mohammed Ben Maati

Today most of the businesses are in continuous search of sophisticated tools and techniques to progressively grow their business. And therefore, the use of intelligence systems has found its pace in the global market. The intelligence systems has mostly effected the E-CRM as it is the most critical and central part for the growth of the business. The E-CRM approaches have enhanced drastically with an integration of the business intelligence systems and organizations are now diligently striving for excellence by gaining benefit from these integrated systems. However, there are many organizations which lag behind in escalating their progress and growth as they have not yet understand how to improve the data quality by using business intelligence systems and therefore used it for decision making. Hence, the following research is conducted to study the implementation trends of Intelligence E-CRM in business process and how the business intelligence systems could help in improvising the data quality and the business processes.


2015 ◽  
pp. 897-919
Author(s):  
Olga Altuhhov ◽  
Raimundas Matulevičius ◽  
Naved Ahmed

Business process modelling is one of the major aspects in the modern information system development. Recently business process model and notation (BPMN) has become a standard technique to support this activity. Typically the BPMN notations are used to understand enterprise's business processes. However, limited work exists regarding how security concerns are addressed during the management of the business processes. This is a problem, since both business processes and security should be understood in parallel to support a development of the secure information systems. In the previous work we have analysed BPMN with respect to the domain model of the IS security risk management (ISSRM) and showed how the language constructs could be aligned to the concepts of the ISSRM domain model. In this paper the authors propose the BPMN extensions for security risk management based on the BPMN alignment to the ISSRM concepts. We illustrate how the extended BPMN could express assets, risks and risk treatment on few running examples related to the Internet store regarding the asset confidentiality, integrity and availability. Our proposal would allow system analysts to understand how to develop security requirements to secure important assets defined through business processes. The paper opens the possibility for business and security model interoperability and the model transformation between several modelling approaches (if these both are aligned to the ISSRM domain model).


Computers ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 160
Author(s):  
Temitope Elizabeth Abioye ◽  
Oluwasefunmi Tale Arogundade ◽  
Sanjay Misra ◽  
Kayode Adesemowo ◽  
Robertas Damaševičius

Despite the attractive benefits of cloud-based business processes, security issues, cloud attacks, and privacy are some of the challenges that prevent many organizations from using this technology. This review seeks to know the level of integration of security risk management process at each phase of the Business Process Life Cycle (BPLC) for securing cloud-based business processes; usage of an existing risk analysis technique as the basis of risk assessment model, usage of security risk standard, and the classification of cloud security risks in a cloud-based business process. In light of these objectives, this study presented an exhaustive review of the current state-of-the-art methodology for managing cloud-based business process security risk. Eleven electronic databases (ACM, IEEE, Science Direct, Google Scholar, Springer, Wiley, Taylor and Francis, IEEE cloud computing Conference, ICSE conference, COMPSAC conference, ICCSA conference, Computer Standards and Interfaces Journal) were used for the selected publications. A total of 1243 articles were found. After using the selection criteria, 93 articles were selected, while 17 articles were found eligible for in-depth evaluation. For the results of the business process lifecycle evaluation, 17% of the approaches integrated security risk management into one of the phases of the business process, while others did not. For the influence of the results of the domain assessment of risk management, three key indicators (domain applicability, use of existing risk management techniques, and integration of risk standards) were used to substantiate our findings. The evaluation result of domain applicability showed that 53% of the approaches had been testing run in real-time, thereby making these works reusable. The result of the usage of existing risk analysis showed that 52.9% of the authors implemented their work using existing risk analysis techniques while 29.4% of the authors partially integrated security risk standards into their work. Based on these findings and results, security risk management, the usage of existing security risk management techniques, and security risk standards should be integrated with business process phases to protect against security issues in cloud services.


Author(s):  
Bashar Shahir Ahmed ◽  
Fadi Amroush ◽  
Mohammed Ben Maati

Today, most businesses are in continuous search of sophisticated tools and techniques to progressively grow their business. Therefore, the use of intelligence systems has found its pace in the global market. The intelligence systems has mostly affected the E-CRM as it is the most critical and central part for the growth of the business. The E-CRM approaches have enhanced drastically with an integration of the business intelligence systems and organizations are now diligently striving for excellence by gaining benefit from these integrated systems. However, there are many organizations that lag behind in escalating their progress and growth as they have not yet understand how to improve the data quality by using business intelligence systems and therefore used it for decision making. Hence, the following research is conducted to study the implementation trends of intelligence E-CRM in business process and how the business intelligence systems could help in improvising the data quality and the business processes.


2019 ◽  
Vol 5 (2) ◽  
pp. 144
Author(s):  
Alla Opalenko ◽  
Oksana Rudenko

The relevance of the study of business process management at manufacturing enterprises is determined by the presence of uncertainty and the existence of risks, in particular, structural risks. The timeliness and value of the abovementioned problem are also determined by the low level of implementation of risk management at enterprises. The provision of mechanisms for increasing the level of risk management is an extremely relevant problem of the modern economy, and the construction of risk optimization models is one of the main in the system of factors that affect the effective operation of the enterprise and the prospects for its development. The purpose of the article is to determine principles of formation and approaches to the construction of an “ideal” organizational structure of a manufacturing enterprise. The application of such principles will allow conducting effective management of a production enterprise. Methodology. Development of economic systems requires from industrial enterprises to develop new approaches to business process management, contributes to the spread of innovation in all spheres of production, forms a new image of structures, and provides their competitiveness in the domestic and world markets. An important area of research is the management of business processes of the enterprise, which will provide conditions for the development and effective operation of production enterprises on the basis of new knowledge, technologies, and effective management. The study was carried out based on the activity of PJSC “Shpolyansky Foodstuffs Plant” for 2014–2018. The practical result of the research conducted is recommendations for the implementation of the risk management system at the manufacturing enterprise, and as a stage – building an “ideal” organizational structure that will allow timely responding to the problems of risk management. Originality. Enterprises combine many business processes that carry out thousands of operations, therefore, it is relevant to develop effective approaches suitable for their detailed description, analysis of the features of operation, optimization, control, diagnosis of problem situations, and the formation of measures for their elimination, management of structural risks. This requires the creation of effective tools for solving these tasks.


2021 ◽  
Vol 5 (2) ◽  
pp. 7-16
Author(s):  
Graciella Valentina ◽  
Pwee Leng

This study aims to determine risk management in the food and beverage business around Petra Christian University (PCU) Surabaya. There was a critical incident of COVID-19 so this research was conducted with the aim of producing reports for business owners related to risk management in business operations. The risk management process consists of stages of risk identification, risk analysis, risk evaluation, and risk management. The population used in this study is food and beverage shop that are easily accessible around PCU with the main target of consumers are students, and PCU employees that is still open the business in the midst of the COVID-19 pandemic. There are only 3 shops out of dozens of food and beverage shops that experienced critical incidents due to PCU implementing online learning which still lasted until this research was conducted. Those risks are spread across 3 different business categories, namely main business process, essential business process, and supporting business process. The majority of risks are in the category of supporting business processes. The same risk can be spread across different risk categories in each foods and beverage shop, this is due to the different risk appetite of each shop.Penelitian ini bertujuan untuk mengetahui manajemen risiko pada bisnis makanan dan minuman di sekitar Universitas Kristen Petra (UKP) Surabaya. Adanya kejadian kritis COVID-19 sehingga penelitian ini dilakukan dengan tujuan untuk menghasilkan laporan bagi pemilik usahaterkait dengan manajemen risiko pada operasional bisnis. Proses manajemen risiko terdiri dari tahapan identifikasi risiko, analisis risiko, evaluasi risiko, dan penanganan risiko. Populasi yang digunakan dalam penelitian ini adalah kedai makanan yang mudah dijangkau di sekitar UKP dengan mayoritas konsumennya mahasiswa, dan karyawan UKP yang masih membuka usaha di tengah pandemi COVID-19. Hanya terdapat 3 kedaimakanan dari beberapa kedai makanan yang mengalami kejadian kritis akibat UKP menerapkan kuliah secara online yang masih bertahan hingga penelitian ini dilakukan. Risiko-risiko tersebut tersebar di 3 kategori bisnis yang berbeda yaitu proses bisnis utama, proses bisnis penunjang, dan proses bisnis pendukung. Mayoritas risiko berada pada kategori proses bisnis pendukung. Risiko yang sama dapat tersebar pada kategori risiko yang berbeda di setiap kedai makanan, hal ini disebabkan oleh selera risiko yang berbeda dari setiap kedai makanan.


Author(s):  
Yurdaer N. Doganata

The importance and the challenges of detecting compliance failures in unmanaged business processes is discussed, and the process of creating and verifying internal controls as a requirement of enterprise risk management framework is explained. The effect of using automated auditing tools to detect compliance failures against internal control points in unmanaged business processes is investigated. Risk exposure of a business process due to compliance failures is analyzed, and the factors that affect the risk exposure of a business process are evaluated.


Author(s):  
Olga Altuhhov ◽  
Raimundas Matulevičius ◽  
Naved Ahmed

Business process modelling is one of the major aspects in the modern information system development. Recently business process model and notation (BPMN) has become a standard technique to support this activity. Typically the BPMN notations are used to understand enterprise's business processes. However, limited work exists regarding how security concerns are addressed during the management of the business processes. This is a problem, since both business processes and security should be understood in parallel to support a development of the secure information systems. In the previous work we have analysed BPMN with respect to the domain model of the IS security risk management (ISSRM) and showed how the language constructs could be aligned to the concepts of the ISSRM domain model. In this paper the authors propose the BPMN extensions for security risk management based on the BPMN alignment to the ISSRM concepts. We illustrate how the extended BPMN could express assets, risks and risk treatment on few running examples related to the Internet store regarding the asset confidentiality, integrity and availability. Our proposal would allow system analysts to understand how to develop security requirements to secure important assets defined through business processes. The paper opens the possibility for business and security model interoperability and the model transformation between several modelling approaches (if these both are aligned to the ISSRM domain model).


Sign in / Sign up

Export Citation Format

Share Document