scholarly journals Multimodal Provenance-based Analysis of Collaboration in Business Processes

2021 ◽  
Vol 12 (5) ◽  
Author(s):  
Maria Luiza Falci ◽  
Andréa Magalhães ◽  
Aline Paes ◽  
Vanessa Braganholo ◽  
Daniel De Oliveira

Modeling business processes as a set of activities to accomplish goals naturally makes them be executed several times. Usually, such executions produce a large portion of provenance data in different formats such as text, audio, and video. Such a multiple-type nature gives origin to multimodal provenance data. Analyzing multimodal provenance data in an integrated form may be complex and error-prone when manually performed as it requires extracting information from free-text, audio, and video files. However, such an analysis may generate valuable insights into the business process. The present article presents MINERVA (Multimodal busINEss pRoVenance Analysis). This approach focuses on identifying improvements that can be implemented in business processes, as well as in collaboration analysis using multimodal provenance data. MINERVA was evaluated through a feasibility study that used data from a consulting company.

Author(s):  
Bibit - Sudarsono ◽  
Umi - Faddillah

Printing service order information systems sometimes experience problems in completing running business processes including, frequent loss and inaccuracy in registering orders from customers, often also losing order data from customers, recording orders often experience errors, resulting inaccurate reporting of order data. A computerized ordering service information system will greatly help improve performance and accuracy in making reports on business processes running at a company. The existence of enterprise modeling of information systems ordering printing services with the TOGAF framework will be a method that greatly helps management make a decision that will synergize with the business process activities at the company. So that the objectives of the system can be achieved properly. The TOGAF framework can be a solution and will help to produce a system architecture design, a business process architecture, a technology architecture, a number of proposed business opportunity strategy proposals and an ongoing system change proposal.


2020 ◽  
Vol 23 (11) ◽  
pp. 1269-1290
Author(s):  
A.A. Turgaeva

Subject. This article analyzes the business processes in the insurance company, using the method of their operation with the selection of key areas of activity. Objectives. The article aims to describe certain business processes in insurance, highlighting participants, lines of activity, and the sequence of procedures. It analyzes the business process Settlement of Losses, which is one of the significant business processes in the insurance company. Methods. For the study, I used the methods of induction and deduction, analogy, and the systems approach. Results. Based on the analysis and description of business processes in the insurance company and the identification of key elements and steps in terms of the effectiveness of decisions, the article identifies the checkpoints of Entry and Exit, activity direction, and resources of the Settlement of Losses process. Conclusions. The application of the categories that split business processes makes it possible to develop step regulation for all processes and acceptable control procedures for different operations. The presented checkpoints at different steps of the business process will help identify weaknesses and eliminate them by re-checking the point.


Author(s):  
Matteo Zavatteri ◽  
Carlo Combi ◽  
Luca Viganò

AbstractA current research problem in the area of business process management deals with the specification and checking of constraints on resources (e.g., users, agents, autonomous systems, etc.) allowed to be committed for the execution of specific tasks. Indeed, in many real-world situations, role assignments are not enough to assign tasks to the suitable resources. It could be the case that further requirements need to be specified and satisfied. As an example, one would like to avoid that employees that are relatives are assigned to a set of critical tasks in the same process in order to prevent fraud. The formal specification of a business process and its related access control constraints is obtained through a decoration of a classic business process with roles, users, and constraints on their commitment. As a result, such a process specifies a set of tasks that need to be executed by authorized users with respect to some partial order in a way that all authorization constraints are satisfied. Controllability refers in this case to the capability of executing the process satisfying all these constraints, even when some process components, e.g., gateway conditions, can only be observed, but not decided, by the process engine responsible of the execution. In this paper, we propose conditional constraint networks with decisions (CCNDs) as a model to encode business processes that involve access control and conditional branches that may be both controllable and uncontrollable. We define weak, strong, and dynamic controllability of CCNDs as two-player games, classify their computational complexity, and discuss strategy synthesis algorithms. We provide an encoding from the business processes we consider here into CCNDs to exploit off-the-shelf their strategy synthesis algorithms. We introduce $$\textsc {Zeta}$$ Z E T A , a tool for checking controllability of CCNDs, synthesizing execution strategies, and executing controllable CCNDs, by also supporting user interactivity. We use $$\textsc {Zeta}$$ Z E T A to compare with the previous research, provide a new experimental evaluation for CCNDs, and discuss limitations.


2017 ◽  
Vol 12 (3) ◽  
pp. 161
Author(s):  
Andy Lieman Candra

AbstrakSekretariat Fakultas Sains dan Teknologi Universitas Ma Chung merupakan fakultas dimana Penulis melakukan penelitian. Tujuan dari penelitian ini adalah untuk menganalisis proses bisnis yang ada di Sekretariat Fakultas Sains dan Teknologi Universitas Ma Chung berdasarkan dari hasil wawancara dengan beberapa stakeholder yang memiliki kebutuhan ataupun keluhan terhadap setiap proses bisnis yang berjalan, mengidentifikasi permasalahan dari proses bisnis yang kurang efisien dan membuat usulan perbaikan untuk setiap proses bisnis dengan menggunakan pendekatan ilmu Business Process Reengineering (BPR). Penulis juga menggunakan metode analisis nilai tambah pada penelitian ini. Tujuan dari penggunaan metode analisis nilai tambah adalah untuk mengkategorikan langkah maupun elemen kerja ke dalam tiga kategori, yakni value adding, business value adding dan non value adding. Pengaktegorisasian tersebut bertujuan untuk menghilangkan langkah maupun elemen kerja yang termasuk kedalam non value adding dan meminimalkan langkah maupun elemen kerja yang termasuk kedalam business value adding. Penulis mengidentikasi permasalahan setiap proses bisnis dengan menggunakan diagram sebab akibat. Diagram sebab akibat dapat menggambarkan dengan jelas mengenai permasalahan dengan faktor-faktor penyebab yang memengaruhi permasalahan di setiap proses bisnis. Hasil dari penelitian ini adalah pendesainan ulang setiap proses bisnis menurut kebutuhan dan keluhan dari stakeholder dan setiap proses bisnis di Sekretariat Fakultas Sains dan Teknologi didokumentasikan dalam bentuk standard operating procedure (SOP). AbstractSecretariat of Faculty of Science and Technology Ma Chung University is a place where the author conducts research. The purposes of this research are to analyze business processes in Secretariat of Faculty of Science and Technology Ma Chung University based on interview results with some stakeholders who have needs or complaints with ongoing business processes, identify problems of less efficient business processes and make proposed improvements for each business process using the Business Process Reengineering approach. Author also uses value added analysis method on this research. The purpose of using value added analysis method is to categorize steps or tasks in every business process into three categories: value adding, business value adding and non value adding. The categorizations aim to eliminate steps or tasks included into non value adding and minimize steps or tasks included into business value adding. Author identifies problems of each business process by using cause and effect diagram. Cause and effect diagram can clearly illustrate the problems with the underlying factors that affect the problem in each business process. The results of this research are redesigning every business processes according to the interview results with stakeholders about their needs and complaints and also every business process in Secretariat of Faculty of Science and Technology are documented in the form of standard operating procedure. Keywords: Business Process Reengineering, Value Added Analysis, Standard Operating Procedure and Cause and Effect Diagram.


2014 ◽  
Vol 568-570 ◽  
pp. 1616-1620
Author(s):  
Min Qin ◽  
Shi Quan Qiao

At present, the enterprise has many business processes. It need transfer many forms involving personnel, procurement and other aspects. The workflow management system uses computer network to realize the automation of the business process. This paper analyses the workflow management system, describes the operational principle of the workflow engine and presents a cooperative platform design based on workflow. It can effectively track the whole process and realize standardized management. Otherwise, it can enhance the enterprise business operation efficiency.


2021 ◽  
Vol 17 (8) ◽  
pp. 1491-1518
Author(s):  
Vilena A. YAKIMOVA ◽  
Viktor S. RADOMSKII

Subject. The article focuses on organizational and methodological issues of internal compliance control in e-commerce businesses. Objectives. We refine the design and technique of internal compliance control for e-commerce businesses. Methods. The study relies upon methods of analysis and generalization, grouping, systematization, risk-based, systems and business process approaches. Results. We devised the five-component compliance control sysem, determined its principles and functions ensuring the economic security of e-commerce businesses. We suggest conducting compliance procedures intended to mitigate IT risks and accounting for the specifics of e-commerce business processes. Conclusions and Relevance. In e-commerce, compliance control serves for identifying and monitoring compliance risks, ensuring safe operations of businesses, which is vital for people. The information system for IT risk protection was found to underlie compliance control, while control procedures can be classified into general and applied. The findings can be used to set up a reliable and effective compliance system for e-commerce businesses in order to prevent economic abuses and crime.


2018 ◽  
Vol 193 ◽  
pp. 05064 ◽  
Author(s):  
Ekaterina Kuleshova ◽  
Anastasia Levina ◽  
Rustam Esedulaev

The paper describes the principle of the reengineering of supply chain management integrated scheduling processes in order to increase in efficiency of business process and decrease the decision-making time at collision of plan-fact deviations. The basic concept of business-processes reengineering is analyzed. The experience of reengineering of supply chain integrated scheduling business processes for the oil and gas branch is presented. The bottlenecks of the current practice were revealed. The purpose of this paper is to carry out recommendations for improving business processes based on an analysis of the current realization of the process, his provision with information systems and data flows.


2019 ◽  
Vol 25 (5) ◽  
pp. 908-922 ◽  
Author(s):  
Remco Dijkman ◽  
Oktay Turetken ◽  
Geoffrey Robert van IJzendoorn ◽  
Meint de Vries

Purpose Business process models describe the way of working in an organization. Typically, business process models distinguish between the normal flow of work and exceptions to that normal flow. However, they often present an idealized view. This means that unexpected exceptions – exceptions that are not modeled in the business process model – can also occur in practice. This has an effect on the efficiency of the organization, because information systems are not developed to handle unexpected exceptions. The purpose of this paper is to study the relation between the occurrence of exceptions and operational performance. Design/methodology/approach The paper does this by analyzing the execution logs of business processes from five organizations, classifying execution paths as normal or exceptional. Subsequently, it analyzes the differences between normal and exceptional paths. Findings The results show that exceptions are related to worse operational performance in terms of a longer throughput time and that unexpected exceptions relate to a stronger increase in throughput time than expected exceptions. Practical implications These findings lead to practical implications on policies that can be followed with respect to exceptions. Most importantly, unexpected exceptions should be avoided by incorporating them into the process – and thus transforming them into expected exceptions – as much as possible. Also, as not all exceptions lead to longer throughput times, continuous improvement should be employed to continuously monitor the occurrence of exceptions and make decisions on their desirability in the process. Originality/value While work exists on analyzing the occurrence of exceptions in business processes, especially in the context of process conformance analysis, to the best of the authors’ knowledge this is the first work that analyzes the possible consequences of such exceptions.


Author(s):  
Ute Riemann

Business processes are not only variable they are as well dynamic. A key benefit of Business Process Management (BPM) is the ability to adjust business processes accordingly in response to changing market requirements. In parallel to BPM, enterprise cloud computing technology has emerged to provide a more cost effective solution to businesses and services while making use of inexpensive computing solutions, which combines pervasive, internet, and virtualization technologies (). Despite the slow start, the business benefits of cloud computing are as such that the transition of BPM to the cloud is now underway. Cloud services refer to the operation of a virtualized, automated, and service-oriented IT landscape allowing the flexible provision and usage-based invoicing of resources, services, and applications via a network or the internet. The generic term “X-as-a-Service” summarize the business models delivering almost everything as a service. BPM in the cloud is often regarded as a SaaS application. More recently, BPM is being regarded as a PaaS as it facilitates the creation and deployment of applications, in this case business process solutions. The PaaS landscape is the least developed of the four cloud based software delivery models previously discussed. PaaS vendors, such as IBM, Oracle, and Microsoft delivered an application platform with managed cloud infrastructure services however, more recently the PaaS market has begun to evolve to include other middleware capabilities including process management. BPM PaaS is the delivery of BPM technology as a service via a cloud service provider. For the classification as a PaaS a BPM suite requires the following capabilities: the architecture should be multi-tenant, hosting should be off premise and it should offer elasticity and metering by use capabilities. When we refer to BPM in the cloud, what we are really referring to is a combination of BPM PaaS and BPaaS (Business Process as a Service). Business Process as a Service (BPaaS) is a set of pre-defined business processes that allows the execution of customized business processes in the cloud. BPaaS is a complete pre-integrated BPM platform hosted in the cloud and delivered as a service, for the development and execution of general-purpose business process application. Although such a service harbors an economic potential there are remaining questions: Can an individual and company-specific business process supported by a standardized cloud solution, or should we protect process creativity and competitive differentiation by allowing the company to design the processes individually and solely support basic data flows and structures? Does it make sense to take a software solution “out of the box” that handles both data and process in a cloud environment, or would this hinder the creativity of business (process) development leading to a lower quality of processes and consequently to a decrease in the competitive positioning of a company? How to manage the inherent compliance and security topic. Within a completely integrated business application system, all required security aspects can be implemented as a safeguarding with just enough money. Within the cloud, however, advanced standards and identity prove is required to monitor and measure information exchange across the federation. Thereby there seems to be no need for developing new protocols, but a standardized way to collect and evaluate the collected information.


2018 ◽  
Vol 30 (1) ◽  
pp. 95-105
Author(s):  
Marco Aurélio de Souza MENDES ◽  
Marcello Peixoto BAX

Abstract Enterprise information architectures still do not deliver all the value that comes from integrating structured and unstructured information. Enterprise Content Management and Business Process Management were developed as autonomous disciplines. Thus, Enterprise Content Management still occurs without formally considering the business processes that generate and manipulate content, while Business Process Management initiatives arise without a documented treatment of materials produced by the processes. The non-integrated approach to these disciplines collaborates to reduce the potential benefits expected in Organizational Change Management programs. In such context, the article discusses the interrelation between Business Process Management and Enterprise Content Management, approaching from a historical view of these disciplines, their conceptual limits, technological support, and dialogues that would benefit both initiatives. The paper contributes to clarify a question still vague in the field of Information Management, which is how to integrate Business Process Management and Enterprise Content Management treating structured and unstructured information in a unified manner. It discusses how to approach this issue in a broad scope of IM by combining the concepts of Enterprise Content Management and Business Process Management. Based on a literature review, the paper analyzes and synthesizes experiences in Enterprise Content Management and Business Process Management acquired in the context of a project carried out in a Power Sector Company. The article reveals problems in separating approaches to Enterprise Content Management and Business Process Management. It shows the importance of an effort for integration and presents three instruments that promote the linkage of the two initiatives, approximating process offices and analysts’ information.


Sign in / Sign up

Export Citation Format

Share Document