planning - designing - developing IT
Special Interest Group on Systems Analysis and Design

EMMSAD

Synthesizing a Library of Process Templates through Partial-Order Planning Algorithms

0
The design time specification of dynamic processes can be time-consuming and error-prone, due to the high number of tasks...

Business Process Workarounds: What Can and Cannot Be Detected by Process Mining

0
Business process workarounds are specific forms of incompliant behavior, where employees intentionally decide to deviate from the required procedures...

Spotting Terminology Deficiencies in Process Model Repositories

0
Thinking in business processes and using process models for their documentation has become common practice in companies. In many...

Using Data-Centric Business Process Modeling for Discovering Requirements for Business Process Support Systems: Experience...

0
Building a process model is a natural part of the requirements engineering (RE) when creating requirements for a computerized...

Modeling of Reference Schemes

0
In natural language, one usually refers to objects by means of proper names or definite descriptions. Languages for data...

A Methodological Framework with Lessons Learned for Introducing Business Process Management

0
Business process management (BPM) is becoming more and more important for organizations of different sizes. However, the introduction of...

Visually Capturing Usage Context in BPMN by Small Adaptations of Diagram Notation

0
For mobile and multi-channel information systems it is often relevant to model where something is supposed to take place...

Repairing Business Process Models as Retrieved from Source Code

0
The static analysis of source code has become a feasible solution to obtain underlying business process models from existing...

Bridging Abstraction Layers in Process Mining: Event to Activity Mapping

0
While the maturity of process mining algorithms emerges and more process mining tools enter the market, process mining projects...

A Combined Process for Elicitation and Analysis of Safety and Security Requirements

0
The aim of safety and security assessments are very similar since they both consider harm during system development. However,...