Search results
1 – 10 of over 11000Daniel Hofer, Markus Jäger, Aya Khaled Youssef Sayed Mohamed and Josef Küng
For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases…
Abstract
Purpose
For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases, timestamps are the only linking points between events caused by attackers, faulty systems or simple errors and their corresponding entries in log files. With the idea of storing and analyzing this log information in graph databases, we need a suitable model to store and connect timestamps and their events. This paper aims to find and evaluate different approaches how to store timestamps in graph databases and their individual benefits and drawbacks.
Design/methodology/approach
We analyse three different approaches, how timestamp information can be represented and stored in graph databases. For checking the models, we set up four typical questions that are important for log file analysis and tested them for each of the models. During the evaluation, we used the performance and other properties as metrics, how suitable each of the models is for representing the log files’ timestamp information. In the last part, we try to improve one promising looking model.
Findings
We come to the conclusion, that the simplest model with the least graph database-specific concepts in use is also the one yielding the simplest and fastest queries.
Research limitations/implications
Limitations to this research are that only one graph database was studied and also improvements to the query engine might change future results.
Originality/value
In the study, we addressed the issue of storing timestamps in graph databases in a meaningful, practical and efficient way. The results can be used as a pattern for similar scenarios and applications.
Details
Keywords
Process mining provides a generic collection of techniques to turn event data into valuable insights, improvement ideas, predictions, and recommendations. This paper uses…
Abstract
Purpose
Process mining provides a generic collection of techniques to turn event data into valuable insights, improvement ideas, predictions, and recommendations. This paper uses spreadsheets as a metaphor to introduce process mining as an essential tool for data scientists and business analysts. The purpose of this paper is to illustrate that process mining can do with events what spreadsheets can do with numbers.
Design/methodology/approach
The paper discusses the main concepts in both spreadsheets and process mining. Using a concrete data set as a running example, the different types of process mining are explained. Where spreadsheets work with numbers, process mining starts from event data with the aim to analyze processes.
Findings
Differences and commonalities between spreadsheets and process mining are described. Unlike process mining tools like ProM, spreadsheets programs cannot be used to discover processes, check compliance, analyze bottlenecks, animate event data, and provide operational process support. Pointers to existing process mining tools and their functionality are given.
Practical implications
Event logs and operational processes can be found everywhere and process mining techniques are not limited to specific application domains. Comparable to spreadsheet software widely used in finance, production, sales, education, and sports, process mining software can be used in a broad range of organizations.
Originality/value
The paper provides an original view on process mining by relating it to the spreadsheets. The value of spreadsheet-like technology tailored toward the analysis of behavior rather than numbers is illustrated by the over 20 commercial process mining tools available today and the growing adoption in a variety of application domains.
Details
Keywords
This paper aims to review the application of business process management (BPM) in the port sector. Its objective is to understand whether BPM principles are applied in the port…
Abstract
Purpose
This paper aims to review the application of business process management (BPM) in the port sector. Its objective is to understand whether BPM principles are applied in the port sector, the role of the procedural factor in port performance evaluation and whether electronic data interchange systems have been used for process management purposes.
Design/methodology/approach
The objective of this research is to conduct a critical review of existing academic literature in the domain of BPM and its application in the ports sector. This paper assessed more than a hundred recent publications, from key journals in the domains of port economics, BPM and information technology. The two principle platforms used are the online databases of the World Bank Group and the University of Antwerp.
Findings
Academic literature reviewed reveals a partial application of BPM in the port and maritime sector. BPM related research is conducted via the utilization of modeling algorithms or optimization and simulation tools. There exists evidence that electronic data interchange (EDI) data extracted from EDI platforms can be used to model inter-organizational business processes in several industries. Yet, to the best of the author’s knowledge, no research investigates Port Community System (PCS) or single window (SW) data utilization for BPM purposes, although PCS and SW benefits are well documented. Port performance is largely assessed based on the production theory, and limited number of studies use elements of procedural efficiency as variables for their analysis.
Originality/value
The holistic application of BPM has been researched in numerous industries but in the port sector. This paper constitutes the first section of an original research study to define key components, assumptions and constraints for developing a comprehensive BPM framework in the port sector.
Details
Keywords
Christian Novak, Lukas Pfahlsberger, Saimir Bala, Kate Revoredo and Jan Mendling
Digitalization, innovation and changing customer requirements drive the continuous improvement of an organization's business processes. IT demand management (ITDM) as a…
Abstract
Purpose
Digitalization, innovation and changing customer requirements drive the continuous improvement of an organization's business processes. IT demand management (ITDM) as a methodology supports the holistic governance of IT and the corresponding business process change (BPC), by allocating resources to meet a company's requirements and strategic objectives. As ITDM decision-makers are not fully aware of how the as-is business processes operate and interact, making informed decisions that positively impact the to-be process is a key challenge.
Design/methodology/approach
In this paper, the authors address this challenge by developing a novel approach that integrates process mining and ITDM. To this end, the authors conduct an action research study where the researchers participated in the design, creation and evaluation of the approach. The proposed approach is illustrated using two sample demands of an insurance claims process. These demands are used to construct the artefact in multiple research circles and to validate the approach in practice. The authors applied learning and reflection methods for incrementally adjusting this study’s approach.
Findings
The study shows that the utilization of process mining activities during process changes on an operational level contributes to (1) increasing accuracy and efficiency of ITDM; (2) timely identification of potential risks and dependencies and (3) support of testing and acceptance of IT demands.
Originality/value
The implementation of this study’s approach improved ITDM practice. It appropriately addressed the information needs of decision-makers and unveiled the effects and consequences of process changes. Furthermore, providing a clearer picture of the process dependencies clarified the responsibilities and the interfaces at the intra- and inter-process level.
Details
Keywords
Mei Sha, Theo Notteboom, Tao Zhang, Xin Zhou and Tianbao Qin
This paper presents a generic simulation model to determine the equipment mix (quay, yard and intra-terminal transfer) for a Container Terminal Logistics Operations System…
Abstract
This paper presents a generic simulation model to determine the equipment mix (quay, yard and intra-terminal transfer) for a Container Terminal Logistics Operations System (CTLOS). The simulation model for the CTLOS, a typical type of discrete event dynamic system (DEDS), consists of three sub-models: ship queue, loading-unloading operations and yard-gate operations. The simulation model is empirically applied to phase 1 of the Yangshan Deep Water Port in Shanghai. This study considers different scenarios in terms of container throughput levels, equipment utilization rates, and operational bottlenecks, and presents a sensitivity analysis to evaluate and choose reasonable equipment ratio ranges under different operational conditions.
Details
Keywords
Güldem Karamustafa-Köse, Susan C. Schneider and Jeff D. Davis
Despite best intentions, mergers and acquisitions often do not live up to the expectations for performance. This study examined how the salience of multiple identities creates…
Abstract
Purpose
Despite best intentions, mergers and acquisitions often do not live up to the expectations for performance. This study examined how the salience of multiple identities creates dynamics in postmerger integration processes and how these dynamics influence the acquisition of the target's capabilities.
Design/methodology/approach
The authors conducted an in-depth case study of a large American consumer goods multinational corporation's acquisition of a family-owned German beauty business and examined responses to decisions and events during the postmerger integration process.
Findings
The results show how and why efforts to acquire unique target capabilities might not deliver the hoped-for results. The authors discovered multiple identities that became salient during the postmerger integration process which subsequently influenced interpretations and reactions to decisions and events and which created intergroup dynamics. The authors also noted the role of language in making these identities salient. Such dynamics pose challenges to managing the postmerger integration process and to acquiring sought after capabilities.
Originality/value
This study reveals how different identities become salient in the interpretation of particular events and decisions, resulting in emotional and behavioral reactions and intergroup dynamics. Furthermore, it uncovers the role of language in making identities salient. This study offers further insight into identity dynamics when the capability of the target firm is the motive of the acquisition.
Details
Keywords
Chloe Louise Williamson and Kelly Rayner-Smith
This paper aims to discuss the utility of eye movement desensitization and reprocessing (EMDR) therapy as a treatment for children with intellectual disabilities (ID) who have…
Abstract
Purpose
This paper aims to discuss the utility of eye movement desensitization and reprocessing (EMDR) therapy as a treatment for children with intellectual disabilities (ID) who have experienced trauma.
Design/methodology/approach
Relevant National Institute for Health and Care Excellence (NICE) guidance and literature were reviewed to provide support for the use of EMDR as a treatment for trauma in children with ID.
Findings
There is a growing body of evidence which demonstrates that EMDR therapy is successful for the treatment of trauma in adults and children. However, for children with ID, the research is limited despite those with ID being more likely than non-disabled peers to experience trauma such as abuse or neglect.
Practical implications
EMDR can only be facilitated by trained mental health nurses, psychiatrists, psychologists (clinical, forensic, counselling or educational) or occupational therapists or social workers with additional training. Finally, general practitioners who are experienced in psychotherapy or psychological trauma and have accreditation. Therefore, this highlights that there may be a lack of trained staff to facilitate this intervention and that those who are generally working with the client closely and long term such as learning disability nurses are not able to conduct this intervention.
Originality/value
This paper presents an account of NICE guidance and evidence of the efficacy of EMDR as a treatment for adults, children and those with ID.
Details
Keywords
Rehab Iftikhar, Mehwish Majeed and Nathalie Drouin
The purpose of this paper is to study the crisis management process for project-based organizations (PBOs) by developing a comprehensive model and propositions.
Abstract
Purpose
The purpose of this paper is to study the crisis management process for project-based organizations (PBOs) by developing a comprehensive model and propositions.
Design/methodology/approach
This paper is based on a conceptual study. A literature review is considered a primary source for studying contemporary research, including 171 publications in total, which embody qualitative, quantitative, conceptual and theoretical studies. For data analysis, content analysis is used, which is comprised of descriptive and thematic analysis.
Findings
This study identifies five imperative elements of crisis management for PBOs which include (1) sense-making (information gathering and crisis interpretation), (2) decision-making (accurate and timely decision), (3) response (reactive response), (4) outcome (success/failure) and (5) learning. Based on these findings, this study proposes an integrative model of the interplay between sense-making, decision-making, response, outcome and learning. Furthermore, the findings lead to propositions for each of the elements. The paper contributes to the literature on dynamic capability theory.
Originality/value
This paper explores the crisis management process for PBOs. The proposed model deepens the understanding of the practices and processes of project-based crisis management.
Details
Keywords
Gopi Battineni, Nalini Chintalapudi and Francesco Amenta
Medical training is a foundation on which better health care quality has been built. Freshly graduated doctors have required a good knowledge of practical competencies, which…
Abstract
Medical training is a foundation on which better health care quality has been built. Freshly graduated doctors have required a good knowledge of practical competencies, which demands the importance of medical training activities. As of this, we propose a methodology to discover a process model for identifying the sequence of medical training activities that had implemented in the installation of a Central Venous Catheter (CVC) with the ultrasound technique. A dataset with twenty medical video recordings were composed with events in the CVC installation. To develop the process model, the adoption of process mining techniques of infrequent Inductive Miner (iIM) with a noise threshold value of 0.3 had done. A combination of parallel and sequential events of the process model was developed. Besides, process conformance was validated with replay fitness value about 61.1%, and it provided evidence that four activities were not correctly fit in the process model. The present study can assist upcoming doctors involved in CVCs surgery by providing continuous training and feedback on better patient care.
Details
Keywords
Kateryna Kubrak, Fredrik Milani and Alexander Nolte
When improving business processes, process analysts can use data-driven methods, such as process mining, to identify improvement opportunities. However, despite being supported by…
Abstract
Purpose
When improving business processes, process analysts can use data-driven methods, such as process mining, to identify improvement opportunities. However, despite being supported by data, process analysts decide which changes to implement. Analysts often use process visualisations to assess and determine which changes to pursue. This paper helps explore how process mining visualisations can aid process analysts in their work to identify, prioritise and communicate business process improvement opportunities.
Design/methodology/approach
The study follows the design science methodology to create and evaluate an artefact for visualising identified improvement opportunities (IRVIN).
Findings
A set of principles to facilitate the visualisation of process mining outputs for analysts to work with improvement opportunities was suggested. Particularly, insights into identifying, prioritising and communicating process improvement opportunities from visual representation are outlined.
Originality/value
Prior work focuses on visualisation from the perspectives – among others – of process exploration, process comparison and performance analysis. This study, however, considers process mining visualisation that aids in analysing process improvement opportunities.
Details