22 research outputs found

    BPM2DDD: A Systematic Process for Identifying Domains from Business Processes Models

    Get PDF
    Domain-driven design is one of the most used approaches for identifying microservice architectures, which should be built around business capabilities. There are a number of documentation with principles and patterns for its application. However, despite its increasing use there is still a lack of systematic approaches for creating the context maps that will be used to design the microservices. This article presents BPM2DDD, a systematic approach for identification of bounded contexts and their relationships based on the analysis of business processes models, which provide a business view of an organisation. We present an example of its application in a real business process, which has also be used to perform a comparative application with external analysts. The technique has been applied to a real project in the department of transport of a Brazilian state capital, and has been incorporated into the software development process employed by them to develop their new system.</jats:p

    Enhancing the Quality of Care in Long-Term Care Settings

    Get PDF
    Quality of care in long-term care is a worldwide issue given the growing numbers of dependent older people. This book presents international research, 22 varied papers, exploring quality of care from several different angles. Important themes include: (1) workforce issues, such as staff training and support; job competencies, satisfaction, and intention to stay in work; staff burnout; effects of personal- and work-related factors on quality of care; (2) intervention studies: for depressive symptoms in nursing home residents; adjustment for new residents; social and psychological support; and loneliness and isolation; (3) methodology, including: developing and testing quality indicators; measuring residents' experience of quality; and assessing partnership between staff and families; and (4) older people's experiences, such as dry eyes and using ocular lubricants; associations between length of stay and end of life care; palliative care service use and comfort at end of of life; and causes of infection-related hospitalization. The book concludes with a systematic review of the current evidence base of care home research in Brazil

    Enhancing the Quality of Care in Long-Term Care Settings

    Get PDF

    Cyber Security of Critical Infrastructures

    Get PDF
    Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods

    Book of abstracts

    Get PDF
    corecore