19 research outputs found

    Modeling Requirements for Value Configuration Design

    Full text link
    Breadth and depth complexity are key challenges in achieving business process fusion as the enabler for value configuration design. The PARM framework is proposed as the requirement to address breadth and depth complexity through the independent but integrated operation of the process, activity, resource and management viewpoints. The operational scenarios for each viewpoint result in varying process modeling extension requirements. Existing process modeling constructs have varying support for these requirements. The PARM framework solution is an extension and integration of existing modeling constructs rather than a solution in its own right. Using the MDA approach of abstracting a platform independent model from a platform specific implementation, it is the goal in future papers to define process modeling extensions to support the PARM framework and map these into existing implementation architectures

    Guest editorial: business process reengineering: an analysis perspective

    No full text

    Editorial: business process reengineering: a modeling perspective

    No full text

    Appropriating information technology artefacts through trial and error: the case of the tablet

    No full text
    The concept of appropriation is of paramount importance for the lasting use of an Information Technology (IT) artefact following its initial adoption, and therefore its success. However, quite often, usersā€™ original expectations are negatively disconfirmed, and instead of appropriating the IT artefact, they discontinue its use. In this study we examine the use of IT artefacts following negative disconfirmation and use Grounded Theory Method techniques to analyse 136 blogposts, collected between March 2011 ā€“ July 2017, to investigate how users appropriate or reject the tablet when technology falls short of usersā€™ expectations. Our findings show that users overcome negative disconfirmation through a trial and error process. In doing so, we identify that users appropriate the tablet when the attained benefits significantly outweigh the risks or sacrifices stemming out of its use. We discuss our contribution within the context of the appropriation literature, and highlight that the success of IT lies with the userā€™s success in identifying personal use scenarios within and across diverse contexts of use

    Legal programming

    No full text
    corecore