This book contains the refereed proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling: * the 23rd International Conference on Business Process Modeling, Development and Support, BPMDS 2022, a
Enterprise, Business-Process and Information Systems Modeling: 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD ... in Business Information Processing, 450)
✍ Scribed by Adriano Augusto (editor), Asif Gill (editor), Dominik Bork (editor), Selmin Nurcan (editor), Iris Reinhartz-Berger (editor), Rainer Schmidt (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 362
- Edition
- 1st ed. 2022
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book contains the refereed proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling:
* the 23rd International Conference on Business Process Modeling, Development and Support, BPMDS 2022, and
* the 27th International Conference on Exploring Modeling Methods for Systems Analysis and Development, EMMSAD 2022.
The conferences were taking place in Leuven, Belgium during June 6-7, 2022.
For BPMDS 7 full papers and 2 short papers were carefully reviewed and selected for publication from a total of 18 submissions; for EMMSAD 11 full papers and 3 short papers were accepted from 30 submissions after thorough reviews.
The papers were organized in topical sections as follows:
BPMDS: Actual and perceived challenges; business process modeling; understanding collaboration: one issue, many perspectives; and event logs – why it derivates;
EMMSAD: Foundations of modeling and method engineering; enterprise, business process, and capability modeling; information systems and requirements modeling; domain-specific and knowledge modeling; and evaluation of modeling approaches.
✦ Table of Contents
Preface
BPMDS 2022
EMMSAD 2022
BPMDS 2022 Organization
EMMSAD 2022 Organization
Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract)
Contents
Actual and Perceived Challenges (BPMDS 2022)
Process Mining Challenges Perceived by Analysts: An Interview Study
1 Introduction
2 Related Work
3 Research Method
4 Findings
4.1 Defining Research Question
4.2 Data Collection
4.3 Data Pre-Processing
4.4 Mining and Analysis
4.5 Stakeholder Evaluation
4.6 Challenges Ranging Across All Phases
5 Discussion
6 Conclusion
References
Towards Process-Oriented IIoT Security Management: Perspectives and Challenges
1 Introduction
2 IIoT Security Management Process
3 Perspectives for Process-Driven IIoT Security
3.1 Process-Oriented Asset Identification and Threat Analysis
3.2 Process-Oriented Risk and Measure Assessment
3.3 Process-Oriented Measure Implementation
3.4 Process-Oriented Monitoring and Security Process Audit
4 Challenges and Intersections
4.1 Modelling Notations for IIoT- and Security-Aware Processes
4.2 Process Modelling Guidelines and Procedures
4.3 Executable Process Models
4.4 Process Analytics for IIoT and Security
5 Conclusion and Outlook
References
Business Process Modeling (BPMDS 2022)
RBPMN - The Power of Roles for Business Process Modeling with BPMN
1 Introduction
1.1 Challenges of BP Modeling
1.2 Research Approach
2 Role Modeling
2.1 Roles
2.2 Roles in Business Process Modeling
3 The RBPMN Modeling Language
3.1 Developing the RBPMN Modeling Language
3.2 Extending the BPMN
3.3 The Syntax of RBPMN Elements
4 Modeling Case Study
5 Evaluation
5.1 Workflow Patterns
5.2 Role Feature Coverage
6 Conclusion
References
A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems
1 Introduction
2 Background
2.1 Business Process Model and Notation
2.2 Process Modeling Problems and Anti-patterns
3 Related Works
3.1 Anti-patterns on Business Process Models
3.2 Visual Feedback About Problems in Business Process Models
4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems
4.1 Process Modeling Tools Selection
4.2 Experiment Parameters
4.3 Overall Results
4.4 Comparison with Related Work
5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature
5.1 Applying Recommendations for Small Process Models
5.2 Applying Recommendations for Large Process Models
5.3 Comparison of the Literature and the Visual Feedback Provided by Tools
6 Conclusion
References
Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022)
A Technique for Collaboration Discovery
1 Introduction
2 The colliery Technique
3 The colliery Tool
4 Experimental Evaluation
5 Related Works
6 Concluding Remarks
References
Understanding Process Management in Non-profit Organisations Without Formal Business Process Management
1 Introduction
2 Literature Review
3 Research Method
4 Findings and Discussion
4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources
4.2 NPOs Instinctively Manage Processes
4.3 NPOs Employ Strategic Approaches to Manage Processes
4.4 NPO Governance and External Bodies Drive Process Change
5 Conclusion
References
Event Logs - Why it Deviates? (BPMDS 2022)
Deviance Analysis by Means of Redescription Mining
1 Introduction
2 Background
2.1 Event Logs
2.2 Deviance Mining
2.3 Declare
3 Related Work
4 Redescription Mining
5 Deviance Mining Approach
5.1 Overall Structure of the Pipeline
5.2 Generate Missing Input
5.3 Declare Constraint Based Feature Extraction
5.4 Redescription Mining
5.5 Comparisons and Analysis of Discovered Redescription Rules
5.6 Natural Language Generation
6 Implementation and Evaluation
6.1 Datasets
6.2 Evaluation Setup
6.3 Discussion of the Order-to-Cash Process
6.4 Overall Results and Conclusion
7 Future Work
References
Detecting Context Activities in Event Logs
1 Introduction
2 Motivation Example
3 Background
4 Preliminaries
5 The Proposed Method
5.1 Build Context Traces
5.2 Build a Point Cloud
5.3 Construct Convex Hulls for the Event Log
5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages
5.5 Identify Context Activities
6 Evaluation on Synthetic Data
7 Evaluation on Real-Life Data
8 Conclusion
References
Event Log Generation: An Industry Perspective
1 Introduction
2 Process Mining Overview
3 Motivation, Research Questions, and Survey Structure
4 Survey Results
4.1 Demographics
4.2 Process Execution
4.3 Process Scoping and Data Sources
4.4 Event Logs
4.5 Process Discovery
4.6 Process Analysis
5 Discussion
5.1 Questioning Academic Assumptions
5.2 Relevance of Academic Research
5.3 Emerging Research Directions
6 Conclusion
References
Foundations of Modeling and Method Engineering (EMMSAD 2022)
Towards a Systematic Method for Developing Meta Attack Language Instances
1 Introduction
2 Background
2.1 Design Science Research
2.2 Meta Attack Language
3 Method
4 The Approach: Applying ADR to Create MAL DSLs
4.1 Stage 1 - Problem Formulation
4.2 Stage 2 - Building, Intervention, and Evaluation
4.3 Stage 3 - Reflection and Learning
4.4 Stage 4 - Formalization of Learning
5 Demonstration
6 Related Work
7 Discussion and Conclusion
References
Enterprise, Business Process, and Capability Modeling (EMMSAD 2022)
Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems
1 Introduction
2 Towards an Interactive Understanding of Transparency
3 Goals, Requirements and Existing Approaches
4 Extensions to MEMO in Support of Transparency
5 Exemplary Application
6 Conclusions
References
Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data
1 Introduction
2 Related Work
3 Method
3.1 Training Log Generation
3.2 Model Training
3.3 Segmentation
4 User Study
5 Conclusion
References
The Integration of Process Simulation Within the Business Architecture
1 Introduction
2 Background
2.1 Related Work
2.2 PGA Modeling Technique
2.3 PGA Simulation Technique
3 Business Architecture Simulation Technique
3.1 Building a Business Architecture Hierarchy
3.2 Simulate the Performance Level of Process Elements
3.3 Propagation of Performance Measures
3.4 Improvement Analysis
4 Conclusion
References
Information Systems and Requirements Modeling (EMMSAD 2022)
Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey
1 Introduction
2 Related Studies
3 Research Methodology
4 Academic MDE Approaches
4.1 Review Process
4.2 Results
5 Industrial Low-Code and No-Code Approaches
5.1 Review Process
5.2 Results
6 Use Case for Low-Code Blockchain Development
7 Discussion and Requirements for Future Developments
8 Conclusion
References
Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method
1 Introduction
2 Research Baseline
2.1 Ontological Analysis
2.2 An Ontology for Requirements (NFRO)
3 ObRE Method
4 Applying ObRE to Ethical Requirements for Intelligent Systems
4.1 The Common Ontology of Value and Risk (COVER)
4.2 Domain Ontology Development and Instantiation: Ethical Requirements
4.3 Requirements Analysis Method Execution
5 Related Works
6 Final Remarks
References
Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work
1 Toward a New Approach for Describing Digital Agents
2 Digital Agents as Algorithmic Agents
3 Work Systems as the Context for Using Digital Agents
3.1 A Hypothetical Work System that Uses AI-Based Digital Agents
4 Facets of Work
5 The Agent Responsibility Framework
6 Application of the AR Framework to Examples
6.1 Example: An Ecommerce Platform as a Digital Agent
6.2 Example: A Real Time Advertising Auction as a Digital Agent
6.3 Example: A Self-driving Car’s Information System as a Digital Agent
7 Discussion and Conclusions
References
A Method for Ontology-Driven Minimum Viable Platform Development
1 Introduction
2 Previous Research
3 A Method for Ontology-Driven MVP Development
4 Method Demonstration: SafaRide
4.1 Analysis
4.2 MVP Development
4.3 Testing
5 Discussion and Future Work
6 Conclusion
References
A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams
1 Introduction
2 Related Work
3 Presentation of MVM
3.1 Context
3.2 Feedback
3.3 Running Example
3.4 User Interface
4 Conclusions and Future Work
References
Domain-Specific and Knowledge Modeling (EMMSAD 2022)
Towards Simplification of ME-Maps
1 Introduction
2 Simplification of ME-Maps
2.1 Valid Simplification
2.2 Simplification Rules
3 Implementation and Evaluation
3.1 Scalability Evaluation
3.2 Understandability
4 Related Work
5 Conclusion and Future Work
References
A Semi-automated Method for Domain-Specific Ontology Creation from Medical Guidelines
1 Introduction
2 Guidelines and Nomenclature in Medical Informatics
3 Medical Guideline Ontology
4 Formalization of the MGO
5 Method for Systematic Creation of Medical Ontologies
5.1 Ontology Creation PDD
5.2 A Detailed Look on Ontology Creation
5.3 Algorithm
6 Application to the Otitis Externa Case
7 Conclusion
References
Towards Access Control Models for Conversational User Interfaces
1 Introduction
2 Background
3 Access-Control Framework for CUIs
3.1 Policy Specification
3.2 Policy Evaluation and Enforcement
3.3 Proof of Concept
4 Related Work
5 Conclusions
References
Evaluation of Modeling Approaches (EMMSAD 2022)
Exploratory Study on Students’ Understanding of Multi-perspective Modelling
1 Introduction
2 Related Work
3 Methodology
3.1 Experiment Set-up
4 Results
4.1 Measured Performance
4.2 Recordings
4.3 Questionnaire
5 Discussion
5.1 Analysis of Mistakes
5.2 Analysis of Recordings
5.3 Analysis of Survey Results
5.4 Reflection on Methodology
5.5 Limitations
6 Conclusion
Appendix 1 – Model Solution
Appendix 2 – Case Description
References
Experiences from Developing a Web Crawler Using a Model-Driven Development Tool: Emerging Opportunities
1 Introduction
2 MDD Tools Overview and Motivation
3 The Use Case: Web Crawling and MDD Tools
4 Results on Developing the Use Case
5 Conclusions and Future Work
References
Posters
Process Mining for Time Series Data
Abstract
1 Introduction
2 Traditional Analysis
3 Process Mining-Based Approach
4 Results and Generality of the Approach
5 Conclusion and Future Research Directions
References
Towards an Information Systems-driven Maturity Model for Industry 4.0
References
Author Index
📜 SIMILAR VOLUMES
This book contains the proceedings of two long-standing workshops: The 10th International Workshop on Business Process Modeling, Development and Support, BPMDS 2009, and the 14th International Conference on Exploring Modeling Methods for Systems Analysis and Design, EMMSAD 2009, held in connection w
<p><p>This book contains the proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling: </p><p> * the 21st International Conference on Business Process Modeling, Development and Support, BPMDS 20
<p><p>This book contains the refereed proceedings of the 12th International Conference on Business Process Modeling, Development and Support (BPMDS 2011) and the 16th International Conference on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2011), held together with the 23rd Int
<p>This book contains the refereed proceedings of the 14th International Conference on Business Process Modeling, Development and Support (BPMDS 2013) and the 18th International Conference on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2013), held together with the 25th Intern
<p><p></p><p>This book constitutes the proceedings of two events held at the CAiSE conference and relating to the areas of enterprise, business process and information systems modeling:<br> The 20th International Conference on Business Process Modeling, Development and Support, BPMDS 2019, and the 2