7 research outputs found

    Procedure For Hybrid Process Analysis And Design

    Get PDF
    Performing business processes are a critical asset for manufacturing companies operating on highly competitive markets. Conventional approaches to business process improvement, however, are vulnerable to subjectivity and high manual efforts in their execution. These challenges can be overcome with recent databased approaches that semi-automate process analysis and design. Those approaches formalize methodical knowledge on weakness detection, measure derivation and performance evaluation for business processes into a performance-related decision support. By enabling the databased automation of these tasks this formalization helps to reduce efforts and subjectivity in process analysis and design. However, practice lacks a procedure for applying this decision support in operative business process improvement. Moreover, this decision support only formalises methodological knowledge. Operative business process improvement in practice additionally requires the consideration of experts' contextual knowledge about the company and the business process itself. This paper presents a hybrid approach for the analysis and design of business processes using a databased decision support. First, existing phase models for business process improvement are consolidated into a reference model. Second, an expert-based assessment is conducted on how decision support extends, modifies or eliminates the conventional tasks of process analysis and design. In the third step, a hybrid phase model for process analysis and design is developed that integrates the formalised methodological knowledge of the decision support and contextual knowledge of experts

    A SECI-Based Knowledge Conversion Model of Business Process Capture

    Get PDF
    Security questions are one of the mechanisms used to recover passwords. Strong answers to security questions (i.e. high entropy) are hard for attackers to guess or obtain using social engineering techniques (e.g. monitoring of social networking profiles), but at the same time are difficult to remember. Instead, weak answers to security questions (i.e. low entropy) are easy to remember, which makes them more vulnerable to cyber-attacks. Convenience leads users to use the same answers to security questions on multiple accounts, which exposes these accounts to numerous cyber-threats. Hence, current security questions implementations rarely achieve the required security and memorability requirements. This research study is the first step in the development of a model which investigates the determinants that influence users’ behavioural intentions through motivation to select strong and memorable answers to security questions. This research also provides design recommendations for novel security questions mechanisms

    Designing Digital Work

    Get PDF
    Combining theory, methodology and tools, this open access book illustrates how to guide innovation in today’s digitized business environment. Highlighting the importance of human knowledge and experience in implementing business processes, the authors take a conceptual perspective to explore the challenges and issues currently facing organizations. Subsequent chapters put these concepts into practice, discussing instruments that can be used to support the articulation and alignment of knowledge within work processes. A timely and comprehensive set of tools and case studies, this book is essential reading for those researching innovation and digitization, organization and business strategy
    corecore