<p><span>This book contains the refereed proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling:</span></p><p><span>* the 24th International Conference on Business Process Modeling, Developmen
Enterprise, Business-Process and Information Systems Modeling (Lecture Notes in Business Information Processing)
â Scribed by Adriano Augusto (editor), Asif Gill (editor), Selmin Nurcan (editor), Iris Reinhartz-Berger (editor), Rainer Schmidt (editor), Jelena Zdravkovic (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 401
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
This book contains the proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling:
* the 22nd International Conference on Business Process Modeling, Development and Support, BPMDS 2021, and
* the 26th International Conference on Exploring Modeling Methods for Systems Analysis and Development, EMMSAD 2021.
For BPMDS 10 full papers and 1 short paper were carefully reviewed and selected for publication from a total of 26 submissions; for EMMSAD 13 full papers and 1 short paper were accepted from 34 submissions.
The papers were organized in topical sections as follows:
BPMDS: Improving event data quality in coherence with business requirements; enhancing the value of data in processesimprovement; event stream and predictive monitoring; modeling languages and reference models;
EMMSAD: Enterprise modeling; handling models and modeling methods; threat and evidence modeling; and model-driven engineering and applications.
⊠Table of Contents
Preface
BPMDS 2021
EMMSAD 2021
BPMDS 2021 Organization
EMMSAD 2021 Organization
Contents
Improving Event Data Quality in Coherence with Business Requirements (BPMDS 2021)
From Network Traffic Data to Business Activities: A Process Mining Driven Conceptualization
1 Introduction
2 Background and Related Work
3 Conceptualizing Business Processes and Network Traffic
4 Network Traffic Behavioral Patterns for an Activity
4.1 Simulation of Business Process Cases
4.2 Packet Capture to Event Log
4.3 Discovery of Network Traffic Behavioral Patterns for Business Activities
5 Evaluation
6 Concluding Discussion
References
A NLP-Oriented Methodology to Enhance Event Log Quality
1 Introduction
2 Related Work
3 LOADING-NLP: Methodology for Assessing and Improving Event Log Quality with NLP
4 Determine the Usability of the Event Log Quality
4.1 Metrics to Measure the Quality of Event Logs
4.2 Quality Dimensions for Event Logs
4.3 Customising the Measurement and Assessment of Event Log Quality
5 Improving Event Log Quality: NLP Techniques for Relabelling Activities
5.1 Decision-Making for the Application of NLP Techniques
5.2 Inferring NLP Techniques to Improve Quality Dimensions
6 Evaluation of the Proposal
7 Conclusions and Future Work
References
Enhancing the Value of Data in Processes Improvement (BPMDS 2021)
Detecting and Understanding Branching Frequency Changes in Process Models
1 Introduction and Motivation
2 Background
3 The Proposed Method
3.1 Step 1: Discovering Process Models and Selecting Interesting Places
3.2 Step 2: Discovering Choice Sequences
3.3 Step 3: Detecting Change Points
4 Evaluation
4.1 Step 1: Discovering Process Models and Selecting Interesting Places
4.2 Step 2: Discovering Choice Sequences
4.3 Step 3: Detecting Change Points
5 Conclusion
References
Detecting the âSplit-Casesâ Workaround in Event Logs
1 Introduction
2 Problem Definition
2.1 Motivating Example
2.2 Problem Formalization
3 Approach
3.1 Preliminary Steps and Inputs
3.2 Detection Algorithm
4 Evaluation
4.1 Experiments Using Simulated Event Logs
4.2 Experimenting with a Real-Life Event Log
5 Related Work
6 Conclusions
References
Towards a Content-Based Process Mining Approach in Personal Services
1 Introduction
2 Theoretical Background
2.1 Personal Services
2.2 Topic Modeling
3 Process of Content-Based Process Mining
3.1 Interviews: Creating the Training Data
3.2 Prototyping: Train the Probability Model
3.3 Classify the Documents and Generating the Models
4 Case Study
4.1 Execution of the Phases
4.2 Generating the Model
4.3 Evaluation
5 Discussion
6 Conclusion and Outlook
References
Event Stream and Predictive Monitoring (BPMDS 2021)
Generating Reliable Process Event Streams and Time Series Data Based on Neural Networks
1 Introduction
2 GENLOG Pipeline for Creating Reliable Process Event Streams and Time Series Data
3 Prototypical Implementation
3.1 Log File Processing
3.2 Data Resampling
3.3 Model Generation
3.4 Data Generation
3.5 Remapping to Log File Format
4 Evaluation in a Real World Scenario
4.1 Log File Processing
4.2 Data Resampling
4.3 Model Generation
4.4 Data Generation
4.5 Remapping to Log File Format
4.6 Discussion of the Results
5 Related Work
6 Conclusion
References
Inter-case Properties and Process Variant Considerations in Time Prediction: A Conceptual Framework
1 Introduction
2 Preliminaries and Basic Concepts
3 Inter-case Properties
3.1 Perspectives of Inter-case Properties
3.2 Consideration of Process Variants
4 Evaluation
4.1 Framework Evaluation
4.2 Variants
4.3 When to Expect Contribution of Inter-case Properties
5 Related Work
6 Conclusion
References
Towards Reliable Business Process Simulation: A Framework to Integrate ERP Systems
1 Introduction
2 Related Work
3 A Framework for the Integration of ERP Systems
3.1 ERP System
3.2 Simulation Engine
3.3 Transformation Engine
4 Implementation
4.1 ERP System: SAP ERP ECC 6.0
4.2 Simulation Engine: CPN Tools
4.3 Transformation Engine: ProM Plug-In
5 Proof of Concept
5.1 Experimental Design
5.2 Scenario 1: Low Conversion Rate
5.3 Scenario 2: Manual Price Changes
5.4 Scenario 3: Frequent Cancellation of Orders
6 Conclusion
References
Modeling Languages and Reference Models (BPMDS 2021)
Supporting Data-Aware Processes with MERODE
1 Introduction and Motivation
2 Related Work
3 Integrating Process and Domain Modelling
3.1 Architectural Layers
3.2 Layers in the MERODE Approach
3.3 Example
3.4 Proof of Concept of Model Integration
4 Evaluation
4.1 General Properties
4.2 Individual Requirements
5 Discussion
6 Conclusion
References
Evaluating Perceived Usefulness and Ease of Use of CMMN and DCR
1 Introduction
2 Background
2.1 Users Perceptions in Business Process Management
2.2 Dynamic Condition Response (DCR)
2.3 Case Management Model and Notation (CMMN)
3 Research Method
3.1 Case Description
4 Result
4.1 Sample DCR Model
4.2 Sample CMMN Model
4.3 Perception Analysis
4.4 Discussion on Biases and Threats to Validity
5 Conclusion
References
Subject-Oriented Reference Model for Virtual Factory Operations Commissioning
1 Introduction
2 Fundamentals
2.1 Subject Orientation
2.2 Process Reference Model
3 The VFOC Process Reference Model
3.1 Model Structure
3.2 Simulation
4 Discussion
4.1 Process Reference Model Quality
5 Summary
References
Enterprise Modeling (EMMSAD 2021)
Participatory Modeling from a Stakeholder Perspective: On the Influence of Collaboration and Revisions on Psychological Ownership and Perceived Model Quality
1 Introduction
2 State of the Art and Theoretical Background
2.1 Participatory and Collaborative Enterprise Modeling
2.2 Psychological Ownership
2.3 Model Quality as Subjective Target
3 Research Method
3.1 Experimental Design
3.2 Measuring the Dependent Variables
3.3 Evaluation Methods
3.4 Sample
4 Results
4.1 Factor and Reliability Analyses
4.2 Analysis Regarding Psychological Ownership
4.3 Analysis Regarding Perceived Model Quality
5 Discussion
5.1 Summary and Interpretation
5.2 Limitations
5.3 Implications for Future Research
References
Reference Service Model for Federated Identity Management
1 Introduction
2 Motivating Scenario
3 Related Approaches
4 Federated Identity Management Service Model
5 Discussion
5.1 Application of the Reference Architecture on the Scenario
5.2 Analysis of the FIMSM Based on the Problem Statement
5.3 Adaptation for Kerberos
6 Conclusion and Outlook
References
Traceability from the Business Value Model to the Enterprise Architecture: A Case Study
1 Introduction
2 Methodology and Research Questions
3 Redesigned Guidelines
4 Case Study
4.1 The Company
4.2 Application of the Guidelines
4.3 Quantification
4.4 Expert Evaluations
5 Related Work
6 Discussion
6.1 Traceability
6.2 A Business Model-Driven Method for EA Design
6.3 Validity
7 Conclusion and Future Work
References
Design Thinking and Enterprise Modeling: An Investigation of Eight Enterprise Architecture Management Projects
1 Introduction
2 Background
2.1 Design Thinking
2.2 Enterprise Architecture Management (EAM) and Architecture Modeling
2.3 For Enterprise Modeling (4EM) and Goals Modeling
3 4EM as a Design Thinking Method
3.1 Participatory Aspects
3.2 Interdisciplinary Aspects
3.3 Human-Centeredness
3.4 Personal Characteristics of a Design Thinker
3.5 Iteration and Experimentation
3.6 Industrial Case of 4EM Goals Modeling for Design Thinking
4 Method
4.1 Research Design
4.2 Design of the Questionnaire
4.3 Data Preprocessing
5 Data Analysis
5.1 Goal Modeling Component and the Understanding of EAM Project Goals
5.2 Goal Modeling and the Added-Value of the Project Artefacts
5.3 Preparedness of the Design Team vs. Perceived Usefulness of the Method
6 Recommendations for Method Application
7 Summary, Limitations and Future Work
References
Handling Models and Modeling Methods (EMMSAD 2021)
Formalizing Conceptual Modeling Methods with METAMORPH
1 Formalization in Conceptual Modeling
2 Conceptualization of the MetaMorph Formalism
3 Formalizing the ProVis Modeling LanguageâA Proof of Concept
3.1 Object Types
3.2 Relation Types
3.3 Attributes
3.4 Additional Symbols
3.5 Constraints
3.6 Formalizing Graphical Models
4 Lessons Learned
5 Conclusion and Outlook
References
Situation-Specific Business Model Development Methods for Mobile App Developers
1 Introduction
2 Background and Related Work
2.1 Business Model Development
2.2 Situational Method Engineering
3 Research Approach
4 Creation of Business Model Development Methods
4.1 Creation of Method Base
4.2 Construction of Development Method
4.3 Tool-Support for Method Development
5 Case Study on Local Event Platform
6 Conclusion
References
Searching for Class Models
1 Introduction
2 Related Work
3 Greedy Search in UCD
3.1 Settings
3.2 The Greedy Search Algorithm
3.3 GS Execution Example
4 Evaluation
4.1 Settings
4.2 Results
4.3 Discussion
4.4 Threats to Validity
5 Summary
References
From Mental Models to Machine Learning Models via Conceptual Models
1 Introduction
2 Related Research
2.1 Mental Models
2.2 Conceptual Modeling
2.3 Machine Learning
3 Framework for Mental Models to Machine Learning Models
4 Application of the Framework: Citizen Science Case
5 Discussion
6 Conclusion
References
Threat and Evidence Modeling (EMMSAD 2021)
Towards Measuring Test Coverage of Attack Simulations
1 Introduction
2 Method
3 Test Coverage for Attack Simulations
3.1 Fundamental Properties of Threat Models and Coverage
3.2 Exemplary Model
3.3 Attack Step Coverage
3.4 Edge Coverage
3.5 Asset Coverage
3.6 Defense Coverage
4 Test Coverage for MAL-Based Languages
4.1 The Meta Attack Language
4.2 Implementation of a Prototype
5 Related Work
6 Conclusion
References
Murder, She Modeled: Modeling to Support Crimino-Forensic Processes
1 Introduction
2 Homicide Crime Scene Staging
2.1 Background
2.2 The Challenge of Applying Conceptual Modeling Techniques in HCSS
3 Conceptual Modeling for Staging Detection
3.1 Case Study: TPH 3002/00 the People v. Siboni
3.2 User Stories in Homicide Staging
3.3 (Mis)Use Cases in Homicide Staging
4 Discussion and Future Work
5 Conclusion
References
Model-Driven Engineering and Applications (EMMSAD 2021)
Model-Driven Engineering: A State of Affairs and Research Agenda
1 Introduction
2 Related Research
3 Methodology
3.1 Defining Research Questions
3.2 Search Strategy for Finding Relevant Papers
3.3 Inclusion and Exclusion Criteria
3.4 Study Selection Procedure
3.5 Quality Criteria
4 Results
4.1 RQ1 - For Which Aspects (Type of Activities) of Software Development Do Practitioners Use Modelling Languages?
4.2 RQ2 - Which Other Modelling Languages Are in Use Next to BPMN and UML and How Often Are They Used?
4.3 RQ3 - Which Problems/Difficulties/Requirements Do Practitioners Have with Model-Driven Engineering?
4.4 RQ4 - What Are the Benefits of Model-Driven Engineering According to Practitioners?
5 Discussion
6 Conclusion
References
FloWare: An Approach for IoT Support and Application Development
1 Introduction
2 Related Work
3 The FloWare Approach
4 The Supporting Toolchain
5 Case Study
6 Conclusion
References
A Model-Based Application for the Effective and Efficient Management of Data Associated with Retina-Macula Pathology
1 Introduction
2 Background and Related Work
3 Conceptual Model of the Macular Pathology (CMMP)
4 Solution Design
5 Validation
6 Conclusions
References
API Management Maturity of Low-Code Development Platforms
1 Introduction
2 Research Method
3 Introduction of the API-m-FAMM
4 Case Studies
5 Analysis of the Results
6 Engineering Research Challenges for LCDPs
7 Threats to Validity
8 Conclusion
References
Author Index
đ SIMILAR VOLUMES
<p><p>This book constitutes the proceedings of two events held at the CAiSE conference and relating to the areas of enterprise, business process and information systems modeling: <br> The 19th International Conference on Business Process Modeling, Development and Support, BPMDS 2018, and the 23rd In
<p><span>This book constitutes the refereed proceedings of the S3E 2023 Topical Area, 24th Conference on Practical Aspects of and Solutions for Software Engineering, KKIO 2023, and 8th Workshop on Advances in Programming Languages, WAPL 2023, as Part of FedCSIS 2023, held in Warsaw, Poland, during S
<span>This is an open access book. </span><p><span>This book comprises all the single courses given as part of the First Summer School on Process Mining, PMSS 2022, which was held in Aachen, Germany, during July 4-8, 2022. </span></p><p><span>This volume contains 17 chapters organized into the follo
<p><span>This book presents techniques for process discovery, conformance checking and enhancement. For process discovery, it introduces the Inductive Miner framework: a recursive skeleton for discovery techniques that in itself provides several guarantees. </span></p><p><span>The framework is insta