Search results
1 – 4 of 4Julian Rott, Markus Böhm and Helmut Krcmar
Process mining (PM) has emerged as a leading technology for gaining data-based insights into organizations’ business processes. As processes increasingly cross-organizational…
Abstract
Purpose
Process mining (PM) has emerged as a leading technology for gaining data-based insights into organizations’ business processes. As processes increasingly cross-organizational boundaries, firms need to conduct PM jointly with multiple organizations to optimize their operations. However, current knowledge on cross-organizational process mining (coPM) is widely dispersed. Therefore, we synthesize current knowledge on coPM, identify challenges and enablers of coPM, and build a socio-technical framework and agenda for future research.
Design/methodology/approach
We conducted a literature review of 66 articles and summarized the findings according to the framework for Information Technology (IT)-enabled inter-organizational coordination (IOC) and the refined PM framework. The former states that within inter-organizational relationships, uncertainty sources determine information processing needs and coordination mechanisms determine information processing capabilities, while the fit between needs and capabilities determines the relationships’ performance. The latter distinguishes three categories of PM activities: cartography, auditing and navigation.
Findings
Past literature focused on coPM techniques, for example, algorithms for ensuring privacy and PM for cartography. Future research should focus on socio-technical aspects and follow four steps: First, determine uncertainty sources within coPM. Second, design, develop and evaluate coordination mechanisms. Third, investigate how the mechanisms assist with handling uncertainty. Fourth, analyze the impact on coPM performance. In addition, we present 18 challenges (e.g. integrating distributed data) and 9 enablers (e.g. aligning different strategies) for coPM application.
Originality/value
This is the first article to systematically investigate the status quo of coPM research and lay out a socio-technical research agenda building upon the well-established framework for IT-enabled IOC.
Details
Keywords
Miquel Centelles and Núria Ferran-Ferrer
Develop a comprehensive framework for assessing the knowledge organization systems (KOSs), including the taxonomy of Wikipedia and the ontologies of Wikidata, with a specific…
Abstract
Purpose
Develop a comprehensive framework for assessing the knowledge organization systems (KOSs), including the taxonomy of Wikipedia and the ontologies of Wikidata, with a specific focus on enhancing management and retrieval with a gender nonbinary perspective.
Design/methodology/approach
This study employs heuristic and inspection methods to assess Wikipedia’s KOS, ensuring compliance with international standards. It evaluates the efficiency of retrieving non-masculine gender-related articles using the Catalan Wikipedian category scheme, identifying limitations. Additionally, a novel assessment of Wikidata ontologies examines their structure and coverage of gender-related properties, comparing them to Wikipedia’s taxonomy for advantages and enhancements.
Findings
This study evaluates Wikipedia’s taxonomy and Wikidata’s ontologies, establishing evaluation criteria for gender-based categorization and exploring their structural effectiveness. The evaluation process suggests that Wikidata ontologies may offer a viable solution to address Wikipedia’s categorization challenges.
Originality/value
The assessment of Wikipedia categories (taxonomy) based on KOS standards leads to the conclusion that there is ample room for improvement, not only in matters concerning gender identity but also in the overall KOS to enhance search and retrieval for users. These findings bear relevance for the design of tools to support information retrieval on knowledge-rich websites, as they assist users in exploring topics and concepts.
Details
Keywords
“Web3” is a practice in participatory digital infrastructures through the ability to read, write, and control own digital assets. Web3 is hailed as the alternative to the failings…
Abstract
“Web3” is a practice in participatory digital infrastructures through the ability to read, write, and control own digital assets. Web3 is hailed as the alternative to the failings of big tech, offering a participatory mode of digital organization and shared ownership of digital infrastructure through algorithmic governance. This paper offers an introductory playbook to researchers entering the field of Web3 by providing an analytical lens to approach the emergent field of Web3 as “infrastructuring.” It argues that Web3 can be understood as a collective, community exploration of “how to infrastructure.” Drawing on qualitative examples derived from digital ethnographic methods, the study reveals that play, politics, and prefiguration are fundamental qualities underpinning Web3’s vision of offering an “exit” from established institutional infrastructures. Therefore, a primary challenge Web3 faces in its governance experiments centers around the question of how to effectively build and manage infrastructure.
Details
Keywords
Prakriti Dumaru, Ankit Shrestha, Rizu Paudel, Cassity Haverkamp, Maryellen Brunson McClain and Mahdi Nasrullah Al-Ameen
The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them…
Abstract
Purpose
The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them as “security tools” in this paper, unless otherwise specified) are designed to protect the security and privacy of people in the digital environment. However, inappropriate use of these tools can lead to unexpected consequences that are preventable. Hence, it is significant to examine why users do not understand the security tools.
Design/methodology/approach
The authors conducted a qualitative study with 40 participants in the USA to investigate the prevalent misconceptions of people regarding security tools, their perceptions of data access and the corresponding impact on their usage behavior and data protection strategies.
Findings
While security vulnerabilities are often rooted in people’s internet usage behavior, this study examined user’s mental models of the internet and unpacked how the misconceptions about security tools relate to those mental models.
Originality/value
Based on the findings, this study offers recommendations highlighting the design aspects of security tools that need careful attention from researchers and industry practitioners, to alleviate users’ misconceptions and provide them with accurate conceptual models toward the desired use of security tools.
Details