22,086 research outputs found

    Towards an Intelligent Workflow Designer based on the Reuse of Workflow Patterns

    Get PDF
    In order to perform process-aware information systems we need sophisticated methods and concepts for designing and modeling processes. Recently, research on workflow patterns has emerged in order to increase the reuse of recurring workflow structures. However, current workflow modeling tools do not provide functionalities that enable users to define, query, and reuse workflow patterns properly. In this paper we gather a suite for both process modeling and normalization based on workflow patterns reuse. This suite must be used in the extension of some workflow design tool. The suite comprises components for the design of processes from both legacy systems and process modeling

    Practitioner Perceptions of the A3 Method for Process Improvement in Health Care

    Get PDF
    The focus of this article is to present students’ perceptions of the recently developed A3 method, a structured problem-solving approach based on lean concepts and tools that have been adapted to the health care environment. The students were all employees of a large health care provider and were enrolled in a customized health care executive MBA Program. Each student was required to complete an individual A3 Project in order to improve a process at the department for which they worked. At the end of the semester the students presented their A3 projects to their peers who voted on the best projects. A survey measuring perceptions of the A3 method for problem solving in health care was administered and from it we present propositions for A3 implementation. These propositions are applicable both to health care practitioners and to academic researchers

    Secure activity resource coordination: empirical evidence of enhanced security awareness in designing secure business processes

    Get PDF
    Systems development methodologies incorporate security requirements as an afterthought in the non-functional requirements of systems. The lack of appropriate access control on information exchange among business activities can leave organizations vulnerable to information assurance threats. The gap between systems development and systems security leads to software development efforts that lack an understanding of security risks. We address the research question: how can we incorporate security as a functional requirement in the analysis and modeling of business processes? This study extends the Semantic approach to Secure Collaborative Inter-Organizational eBusiness Processes in D’Aubeterre et al. (2008). In this study, we develop the secure activity resource coordination (SARC) artifact for a real-world business process. We show how SARC can be used to create business process models characterized by the secure exchange of information within and across organizational boundaries. We present an empirical evaluation of the SARC artifact against the Enriched-Use Case (Siponen et al., 2006) and standard UML-Activity Diagram to demonstrate the utility of the proposed design method

    Event-Cloud Platform to Support Decision- Making in Emergency Management

    Full text link
    The challenge of this paper is to underline the capability of an Event-Cloud Platform to support efficiently an emergency situation. We chose to focus on a nuclear crisis use case. The proposed approach consists in modeling the business processes of crisis response on the one hand, and in supporting the orchestration and execution of these processes by using an Event-Cloud Platform on the other hand. This paper shows how the use of Event-Cloud techniques can support crisis management stakeholders by automatizing non-value added tasks and by directing decision- makers on what really requires their capabilities of choice. If Event-Cloud technology is a very interesting and topical subject, very few research works have considered this to improve emergency management. This paper tries to fill this gap by considering and applying these technologies on a nuclear crisis use-case

    An Overview of Economic Approaches to Information Security Management

    Get PDF
    The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security. As a result, senior managers in many organizations are now expressing a much greater interest in information security. However, the largest body of research related to preventing breaches is technical, focusing on such issues as encryption and access control. In contrast, research related to the economic aspects of information security is small but rapidly growing. The goal of this technical note is twofold: i) to provide the reader with an structured overview of the economic approaches to information security and ii) to identify potential research directions

    Applied Healthcare Knowledge Management for Hospital in Clinical Aspect

    Get PDF
    Medical industry uses the information as a critical factor in running the three aspects of hospital management which includes administrative, financial and clinical. Objectives to be achieved is to identify healthcare knowledge resources and models of knowledge sharing, identifying culture, strategy and knowledge management supporting facilities, plotting knowledge resources and mapping supporting features of knowledge portals as well as doing analysis and design of healthcare knowledge management portal that developed.In achieving the purpose of analysis and design of healthcare knowledge management portal, is done through several stages of the methodology, where the identification process carried out primary and secondary data collection, while the analysis on the management aspects was performed cultural analysis with OCAI methods and the analysis and design of information systems with OOAD approach using UML models. PELNI Hospital is using for this case study. From analysis and design of healthcare knowledge management portal is expected to get a picture of the current organizational culture and the expected culture, the description of network infrastructure and organizational strategies related to resource and knowledge destination to produce a Knowledge Management Portal

    A DATABASE ARCHITECTURE FOR SUPPORTING BUSINESS TRANSACTIONS

    Get PDF
    The central hypothesis of this paper is that database design and systems design in general can be simplified considerably by tailoring the design methods to a suitable range of applications. Domain-specific knowledge can be incorporated into a specialized database architecture that leaves the designer with the task to specify only the application-specific parts. Based on an analysis of business constraints, we propose such an architecture for the domain of business transaction processing. The architecture offers several data and transaction management services, special-purpose sub-databases, and design checking rules to be used by the application designer. Two services, input management and audit and control services, are described in more detail.Information Systems Working Papers Serie
    corecore