Search results

1 – 10 of over 15000
Article
Publication date: 13 September 2011

Axel Winkelmann and Burkhard Weiß

Financial institutions have been engaged in numerous business process reengineering (BPR) projects to make their organizations more efficient. However, the success of BPR…

2391

Abstract

Purpose

Financial institutions have been engaged in numerous business process reengineering (BPR) projects to make their organizations more efficient. However, the success of BPR projects in banks varies significantly and it remains a challenge to systematically discover weaknesses in business process landscapes. Based on the flow chart notation language this paper seeks to argue for the definition of weakness patterns in order to automatically identify potential process weaknesses.

Design/methodology/approach

The authors developed weakness patterns in the flow chart notation language based on design science principles. To systematically derive process weaknesses that can be formalized, they analyzed each element of the flow chart notation as it was used in a real‐life case. They furthermore tested the identified patterns in reality in order to evaluate their validity.

Findings

The authors identified various potential weakness patterns that helped in automatically identifying weaknesses in process models. To some extent these findings are generalizable and transferable to other process modeling languages.

Research limitations/implications

The pattern‐based approach depends upon how well structural weakness patterns are defined and formalized. Identified problems remain “potential” weaknesses until a manual analysis reveals that the identified potential weaknesses are actually real weaknesses or not, e.g. due to law regulations.

Practical implications

Using weakness patterns allows for automatically identifying potential process weaknesses in existing flow chart models. This way, this research helps in improving the so far manual analysis of process model landscapes.

Originality/value

The approach is a new way of looking for process weaknesses through process weakness patterns.

Details

Business Process Management Journal, vol. 17 no. 5
Type: Research Article
ISSN: 1463-7154

Keywords

Book part
Publication date: 1 November 2007

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

Article
Publication date: 17 August 2015

Matthias Elser, Ronald Mies, Peter Altendorf, Alberto Messina, Fulvio Negro, Werner Bailer, Albert Hofmann and Georg Thallinger

This paper aims to propose a service-oriented framework for performing content annotation and search, adapted to the task context. Media production workflows are becoming…

Abstract

Purpose

This paper aims to propose a service-oriented framework for performing content annotation and search, adapted to the task context. Media production workflows are becoming increasingly distributed and heterogeneous.The tasks of professionals in media production can be supported by automatic content analysis and search and retrieval services.

Design/methodology/approach

The processes of the framework are derived top-down, starting from business goals and scenarios in audiovisual media production. Formal models of tasks in the production workflow are defined, and business processes are derived from the task models. A software framework enabling the orchestrated execution of these models is developed.

Findings

This paper presents a framework that implements the proposed approach called Metadata Production Management Framework (MPMF). The authors show how a media production workflow for a real-world scenario is implemented using the MPMF.

Research limitations/implications

The authors have demonstrated the feasibility of a model-based approach for media processing. In the reification step, there is still information that needs to be provided in addition to the task models to obtain executable processes. Future research should target the further automation of this process.

Practical implications

By means of this approach, the implementation of the business process defines the workflow, whereas the services that are actually used are defined by the configuration. Thus, the processes are stable and, at the same time, the services can be managed very flexibly. If necessary, service implementations can also be completely replaced by others without changing the business process implementation.

Originality/value

The authors introduce a model-based approach to media processing and define a reification process from business-driven task models to executable workflows. This enables a more task-oriented design of media processing workflows and adaptive use of automatic information extraction tools.

Details

International Journal of Web Information Systems, vol. 11 no. 3
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 14 February 2022

Stevan Milovanović, Zorica Bogdanović, Aleksandra Labus, Marijana Despotović-Zrakić and Svetlana Mitrović

The paper aims to studiy social recruiting for finding suitable candidates on social networks. The main goal is to develop a methodological approach that would enable…

Abstract

Purpose

The paper aims to studiy social recruiting for finding suitable candidates on social networks. The main goal is to develop a methodological approach that would enable preselection of candidates using social network analysis. The research focus is on the automated collection of data using the web scraping method. Based on the information collected from the users' profiles, three clusters of skills and interests are created: technical, empirical and education-based. The identified clusters enable the recruiter to effectively search for suitable candidates.

Design/methodology/approach

This paper proposes a new methodological approach for the preselection of candidates based on social network analysis (SNA). The defined methodological approach includes the following phases: Social network selection according to the defined preselection goals; Automatic data collection from the selected social network using the web scraping method; Filtering, processing and statistical analysis of data. Data analysis to identify relevant information for the preselection of candidates using attributes clustering and SNA. Preselection of candidates is based on the information obtained.

Findings

It is possible to contribute to candidate preselection in the recruiting process by identifying key categories of skills and interests of candidates. Using a defined methodological approach allows recruiters to identify candidates who possess the skills and interests defined by the search. A defined method automates the verification of the existence, or absence, of a particular category of skills or interests on the profiles of the potential candidates. The primary intention is reflected in the screening and filtering of the skills and interests of potential candidates, which contributes to a more effective preselection process.

Research limitations/implications

A small sample of the participants is present in the preliminary evaluation. A manual revision of the collected skills and interests is conducted. The recruiters should have basic knowledge of the SNA methodology in order to understand its application in the described method. The reliability of the collected data is assessed, because users provide data themselves when filling out their social network profiles.

Practical implications

The presented method could be applied on different social networks, such as GitHub or AngelList for clustering profile skills. For a different social network, only the web scraping instructions would change. This method is composed of mutually independent steps. This means that each step can be implemented differently, without changing the whole process. The results of a pilot project evaluation indicate that the HR experts are interested in the proposed method and that they would be willing to include it in their practice.

Social implications

The social implication should be the determination of relevant skills and interests during the preselection phase of candidates in the process of social recruitment.

Originality/value

In contrast to previous studies that were discussed in the paper, this paper defines a method for automatic data collection using the web scraper tool. The described method allows the collection of more data in a shorter period. Additionally, it reduces the cost of creating an initial data set by removing the cost of hiring interviewers, questioners and people who collect data from social networks. A completely automated process of data collection from a particular social network stands out from this model from currently available solutions. Considering the method of data collection implemented in this paper, the proposed method provides opportunities to extend the scope of collected data to implicit data, which is not possible using the tools presented in other papers.

Details

Data Technologies and Applications, vol. 56 no. 4
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 1 May 2007

K.P. Fischer, U. Bleimann, W. Fuhrmann and S.M. Furnell

Aims to identify security‐relevant semantics of business processes being defined by WS‐BPEL (Web Services Business Process Execution Language, BPEL for short) scripts, in…

509

Abstract

Purpose

Aims to identify security‐relevant semantics of business processes being defined by WS‐BPEL (Web Services Business Process Execution Language, BPEL for short) scripts, in particular, when such scripts defining collaborative business processes on top of web services are deployed across security domain boundaries.

Design/methodology/approach

Analysing potential of BPEL to define behaviour of business processes violating restrictions implied by security policies.

Findings

Semantic patterns being combinations of particular BPEL features and web services with specific access restrictions implied by security policies are defined and their implications for analysis of BPEL scripts during compliance assessment of cross‐domain defined business processes are identified.

Research limitations/implications

The results of the research part of which is reported here have been applied in a research prototype to BPEL scripts of limited size and comparatively simple business logic. Real‐world examples of BPEL scripts with respect to size and complexity should be examined for further approving suitability of the algorithms used.

Originality/value

The results can be used to specify security policies in terms of security‐critical semantics of BPEL scripts in order to facilitate compliance assessment. In conjunction with other results of this research, this will help to overcome security issues arising from cross‐domain definition of business processes by enabling automatic compliance assessment prior to execution.

Details

Information Management & Computer Security, vol. 15 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 April 2006

Ray Tsaih and Wan‐Ying Lin

To manage linkages amongst value activities, this study seeks to explore to a greater extent the underlying information‐processing infrastructure of the value chain, and…

1268

Abstract

Purpose

To manage linkages amongst value activities, this study seeks to explore to a greater extent the underlying information‐processing infrastructure of the value chain, and then to derive a corresponding business process analysis framework.

Design/methodology/approach

The approach is an in‐depth investigation of the information‐processing infrastructure underlying the value chain activities.

Findings

This study leads to the process‐wide information organism approach and further delivers a business process analysis framework for describing and measuring mechanisms of managing the information flow underlying the strategic business process.

Originality/value

The information‐processing infrastructure underlying the value chain and thus the business process has been identified, and an analytical framework for describing and measuring mechanisms of managing the information flow underlying the strategic business process has been proposed.

Details

Industrial Management & Data Systems, vol. 106 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 February 1990

Gordon Wills, Sherril H. Kennedy, John Cheese and Angela Rushton

To achieve a full understanding of the role ofmarketing from plan to profit requires a knowledgeof the basic building blocks. This textbookintroduces the key concepts in…

13098

Abstract

To achieve a full understanding of the role of marketing from plan to profit requires a knowledge of the basic building blocks. This textbook introduces the key concepts in the art or science of marketing to practising managers. Understanding your customers and consumers, the 4 Ps (Product, Place, Price and Promotion) provides the basic tools for effective marketing. Deploying your resources and informing your managerial decision making is dealt with in Unit VII introducing marketing intelligence, competition, budgeting and organisational issues. The logical conclusion of this effort is achieving sales and the particular techniques involved are explored in the final section.

Details

Management Decision, vol. 28 no. 2
Type: Research Article
ISSN: 0025-1747

Keywords

Book part
Publication date: 8 March 2018

Miklos A. Vasarhelyi, Michael G. Alles and Alexander Kogan

The advent of new enabling technologies and the surge in corporate scandals has combined to increase the supply, the demand, and the development of enabling technologies…

Abstract

The advent of new enabling technologies and the surge in corporate scandals has combined to increase the supply, the demand, and the development of enabling technologies for a new system of continuous assurance and measurement. This paper positions continuous assurance (CA) as a methodology for the analytic monitoring of corporate business processes, taking advantage of the automation and integration of business processes brought about by information technologies. Continuous analytic monitoring-based assurance will change the objectives, timing, processes, tools, and outcomes of the assurance process.

The objectives of assurance will expand to encompass a wide set of qualitative and quantitative management reports. The nature of this assurance will be closer to supervisory activities and will involve intensive interchange with more of the firm s stakeholders than just its shareholders. The timing of the audit process will be very close to the event, automated, and will conform to the natural life cycle of the underlying business processes. The processes of assurance will change dramatically to being meta-supervisory in nature, intrusive with the potential of process interruption, and focusing on very different forms of evidential matter than the traditional audit. The tools of the audit will expand considerably with the emergence of major forms of new auditing methods relying heavily on an integrated set of automated information technology (IT) and analytical tools. These will include automatic confirmations (confirmatory extranets), control tags (transparent tagging) tools, continuity equations, and time-series cross-sectional analytics. Finally, the outcomes of the continuous assurance process will entail an expanded set of assurances, evergreen opinions, some future assurances, some improvement on control processes (through incorporating CA tests), and some improved data integrity.

A continuous audit is a methodology that enables independent auditors to provide written assurance on a subject matter, for which an entity’s management is responsible, using a series of auditors’ reports issued virtually simultaneously with, or a short period of time after, the occurrence of events underlying the subject matter.

  • CICA/AICPA Research Study on Continuous Auditing (1999)

CICA/AICPA Research Study on Continuous Auditing (1999)

Companies must disclose certain information on a current basis.

  • Corporate and Auditing Accountability, Responsibility, and Transparency (Sarbanes-Oxley) Act (2002)

Corporate and Auditing Accountability, Responsibility, and Transparency (Sarbanes-Oxley) Act (2002)

Details

Continuous Auditing
Type: Book
ISBN: 978-1-78743-413-4

Book part
Publication date: 10 December 2015

Chun Kit Lok

Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption…

Abstract

Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption behavior of E-payment systems that employ smart card technology becomes a research area that is of particular value and interest to both IS researchers and professionals. However, research interest focuses mostly on why a smart card-based E-payment system results in a failure or how the system could have grown into a success. This signals the fact that researchers have not had much opportunity to critically review a smart card-based E-payment system that has gained wide support and overcome the hurdle of critical mass adoption. The Octopus in Hong Kong has provided a rare opportunity for investigating smart card-based E-payment system because of its unprecedented success. This research seeks to thoroughly analyze the Octopus from technology adoption behavior perspectives.

Cultural impacts on adoption behavior are one of the key areas that this research posits to investigate. Since the present research is conducted in Hong Kong where a majority of population is Chinese ethnicity and yet is westernized in a number of aspects, assuming that users in Hong Kong are characterized by eastern or western culture is less useful. Explicit cultural characteristics at individual level are tapped into here instead of applying generalization of cultural beliefs to users to more accurately reflect cultural bias. In this vein, the technology acceptance model (TAM) is adapted, extended, and tested for its applicability cross-culturally in Hong Kong on the Octopus. Four cultural dimensions developed by Hofstede are included in this study, namely uncertainty avoidance, masculinity, individualism, and Confucian Dynamism (long-term orientation), to explore their influence on usage behavior through the mediation of perceived usefulness.

TAM is also integrated with the innovation diffusion theory (IDT) to borrow two constructs in relation to innovative characteristics, namely relative advantage and compatibility, in order to enhance the explanatory power of the proposed research model. Besides, the normative accountability of the research model is strengthened by embracing two social influences, namely subjective norm and image. As the last antecedent to perceived usefulness, prior experience serves to bring in the time variation factor to allow level of prior experience to exert both direct and moderating effects on perceived usefulness.

The resulting research model is analyzed by partial least squares (PLS)-based Structural Equation Modeling (SEM) approach. The research findings reveal that all cultural dimensions demonstrate direct effect on perceived usefulness though the influence of uncertainty avoidance is found marginally significant. Other constructs on innovative characteristics and social influences are validated to be significant as hypothesized. Prior experience does indeed significantly moderate the two influences that perceived usefulness receives from relative advantage and compatibility, respectively. The research model has demonstrated convincing explanatory power and so may be employed for further studies in other contexts. In particular, cultural effects play a key role in contributing to the uniqueness of the model, enabling it to be an effective tool to help critically understand increasingly internationalized IS system development and implementation efforts. This research also suggests several practical implications in view of the findings that could better inform managerial decisions for designing, implementing, or promoting smart card-based E-payment system.

Details

E-services Adoption: Processes by Firms in Developing Nations
Type: Book
ISBN: 978-1-78560-709-7

Keywords

Article
Publication date: 12 May 2020

Serge-Lopez Wamba-Taguimdje, Samuel Fosso Wamba, Jean Robert Kala Kamdjoug and Chris Emmanuel Tchatchouang Wanko

The main purpose of our study is to analyze the influence of Artificial Intelligence (AI) on firm performance, notably by building on the business value of AI-based…

10243

Abstract

Purpose

The main purpose of our study is to analyze the influence of Artificial Intelligence (AI) on firm performance, notably by building on the business value of AI-based transformation projects. This study was conducted using a four-step sequential approach: (1) analysis of AI and AI concepts/technologies; (2) in-depth exploration of case studies from a great number of industrial sectors; (3) data collection from the databases (websites) of AI-based solution providers; and (4) a review of AI literature to identify their impact on the performance of organizations while highlighting the business value of AI-enabled projects transformation within organizations.

Design/methodology/approach

This study has called on the theory of IT capabilities to seize the influence of AI business value on firm performance (at the organizational and process levels). The research process (responding to the research question, making discussions, interpretations and comparisons, and formulating recommendations) was based on a review of 500 case studies from IBM, AWS, Cloudera, Nvidia, Conversica, Universal Robots websites, etc. Studying the influence of AI on the performance of organizations, and more specifically, of the business value of such organizations’ AI-enabled transformation projects, required us to make an archival data analysis following the three steps, namely the conceptual phase, the refinement and development phase, and the assessment phase.

Findings

AI covers a wide range of technologies, including machine translation, chatbots and self-learning algorithms, all of which can allow individuals to better understand their environment and act accordingly. Organizations have been adopting AI technological innovations with a view to adapting to or disrupting their ecosystem while developing and optimizing their strategic and competitive advantages. AI fully expresses its potential through its ability to optimize existing processes and improve automation, information and transformation effects, but also to detect, predict and interact with humans. Thus, the results of our study have highlighted such AI benefits in organizations, and more specifically, its ability to improve on performance at both the organizational (financial, marketing and administrative) and process levels. By building on these AI attributes, organizations can, therefore, enhance the business value of their transformed projects. The same results also showed that organizations achieve performance through AI capabilities only when they use their features/technologies to reconfigure their processes.

Research limitations/implications

AI obviously influences the way businesses are done today. Therefore, practitioners and researchers need to consider AI as a valuable support or even a pilot for a new business model. For the purpose of our study, we adopted a research framework geared toward a more inclusive and comprehensive approach so as to better account for the intangible benefits of AI within organizations. In terms of interest, this study nurtures a scientific interest, which aims at proposing a model for analyzing the influence of AI on the performance of organizations, and at the same time, filling the associated gap in the literature. As for the managerial interest, our study aims to provide managers with elements to be reconfigured or added in order to take advantage of the full benefits of AI, and therefore improve organizations’ performance, the profitability of their investments in AI transformation projects, and some competitive advantage. This study also allows managers to consider AI not as a single technology but as a set/combination of several different configurations of IT in the various company’s business areas because multiple key elements must be brought together to ensure the success of AI: data, talent mix, domain knowledge, key decisions, external partnerships and scalable infrastructure.

Originality/value

This article analyses case studies on the reuse of secondary data from AI deployment reports in organizations. The transformation of projects based on the use of AI focuses mainly on business process innovations and indirectly on those occurring at the organizational level. Thus, 500 case studies are being examined to provide significant and tangible evidence about the business value of AI-based projects and the impact of AI on firm performance. More specifically, this article, through these case studies, exposes the influence of AI at both the organizational and process performance levels, while considering it not as a single technology but as a set/combination of the several different configurations of IT in various industries.

Details

Business Process Management Journal, vol. 26 no. 7
Type: Research Article
ISSN: 1463-7154

Keywords

1 – 10 of over 15000