Search results
1 – 3 of 3Kan Ngamakeur and Sira Yongchareon
The paper aims to study realization requirements for the flexible enactment of artifact-centric business processes in a dynamic, collaborative environment and to develop a…
Abstract
Purpose
The paper aims to study realization requirements for the flexible enactment of artifact-centric business processes in a dynamic, collaborative environment and to develop a workflow execution framework that can effectively address those requirements.
Design/methodology/approach
This study proposed a framework and contract-based, event-driven architecture design and implementation that can directly realize collaborative artifact-centric business processes in service-oriented architecture (SOA) without any model conversion.
Findings
The results show that the approach is feasible in presenting several key benefits over the use of existing workflow systems to run artifact-centric processes.
Originality/value
Most of the existing approaches require an artifact-centric model to be transformed into executable workflow languages to run on existing workflow management systems. This study argues that the model conversion can incur losses of information and affect traceability and monitoring ability of workflows, especially in an SOA where a workflow can span across multiple inter-business entities.
Details
Keywords
Wenyuan Wang and Sira Yongchareon
This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups…
Abstract
Purpose
This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups. Further, the report will advise commercial applications and advice of SECaaS as an extended context to help firms make decisions.
Design/methodology/approach
This paper compares the SECaaS categories in Cloud Security Alliance (CSA) with the security clauses in ISO/IEC 27002:2013 to give a comprehensive analysis of those SECaaS categories. Reviewed from a number of related literature, this paper analyzes and categorizes SECaaS into three major groups including protective, detective and reactive based on security control perspectives. This study has discussed the three groups and their interplay to identify the key characteristics and problems that they aim to address.
Findings
This paper also adds new evidence to support a better understanding of the current and future challenges and directions for SECaaS. Also, the study reveals both the positive and negative aspects of SECaaS along with business cases. It advises on various sizes and domains of organizations to consider SECaaS as one of their potential security approaches.
Originality/value
SECaaS has been demonstrated to be one of the increasingly popular ways to address security problems in Cloud computing. As a new concept, SECaaS could be treated as integrated security means and delivered as a service module in the Cloud. However, it is still in infancy and not very widely investigated. Recent studies suggest that SECaaS is an efficient solution for Cloud and real industries. However, shortcomings of SECaaS have not been well-studied and documented. Moreover, reviewing the existing research, researchers did not classify the SECaaS-related categories.
Details
Keywords
Xiaohui Zhao, Sira Yongchareon and Nam-Wook Cho
The purpose of this research is to explore the ways of integrating situational awareness into business process management for the purpose of realising hyper automated business…
Abstract
Purpose
The purpose of this research is to explore the ways of integrating situational awareness into business process management for the purpose of realising hyper automated business processes. Such business processes will help improve their customer experiences, enhance the reliability of service delivery and lower the operational cost for a more competitive and sustainable business.
Design/methodology/approach
Ontology has been deployed to establish the context modelling method, and the event handling mechanisms are developed on the basis of event calculus. An approach on performance of the proposed approach has been evaluation by checking the cost savings from the simulation of a large number of business processes.
Findings
In this research, the authors have formalised the context presentation for a business process with a focus on rules and entities to support context perception; proposed a system architecture to illustrate the structure and constitution of a supporting system for intelligent and situation aware business process management; developed real-time event elicitation and interpretation mechanisms to operationalise the perception of contextual dynamics and real-time responses; and evaluated the applicability of the proposed approaches and the performance improvement to business processes.
Originality/value
This paper presents a framework covering process context modelling, system architecture and real-time event handling mechanisms to support situational awareness of business processes. The reported research is based on our previous work on radio frequency identification-enabled applications and context-aware business process management with substantial extension to process context modelling and process simulation.
Details