Search results
1 – 10 of 204Gregor Polančič and Boštjan Orban
Despite corporate communications having an immense impact on corporate success, there is a lack of dedicated techniques for their management and visualization. A potential…
Abstract
Purpose
Despite corporate communications having an immense impact on corporate success, there is a lack of dedicated techniques for their management and visualization. A potential strategy is to apply business process management (BPM) approach with business process model and notation (BPMN) modeling techniques.
Design/methodology/approach
The goal of this study was to gain empirical insights into the cognitive effectiveness of BPMN-based corporate communications modeling. To this end, experimental research was performed in which subjects tested two modeling notations – standardized BPMN conversation diagrams and a BPMN extension with corporate communications-specific concepts.
Findings
Standard conversation diagrams were demonstrated to be more time-efficient for designing and interpreting diagrams. However, the subjects made significantly fewer mistakes when interpreting the diagrams modeled in the BPMN extension. Subjects also evolved positive perceptions toward the proposed extension.
Practical implications
BPMN-based corporate communications modeling may be applied to organizations to depict how formal communications are or should be performed consistently, effectively and transparently by following and integrating with BPM approaches and modeling techniques.
Originality/value
The paper provides empirical insights into the cognitive effectiveness of corporate communications modeling based on BPMN and positions the corresponding models into typical process architecture.
Details
Keywords
Tomás Lopes and Sérgio Guerreiro
Testing business processes is crucial to assess the compliance of business process models with requirements. Automating this task optimizes testing efforts and reduces human error…
Abstract
Purpose
Testing business processes is crucial to assess the compliance of business process models with requirements. Automating this task optimizes testing efforts and reduces human error while also providing improvement insights for the business process modeling activity. The primary purposes of this paper are to conduct a literature review of Business Process Model and Notation (BPMN) testing and formal verification and to propose the Business Process Evaluation and Research Framework for Enhancement and Continuous Testing (bPERFECT) framework, which aims to guide business process testing (BPT) research and implementation. Secondary objectives include (1) eliciting the existing types of testing, (2) evaluating their impact on efficiency and (3) assessing the formal verification techniques that complement testing.
Design/methodology/approach
The methodology used is based on Kitchenham's (2004) original procedures for conducting systematic literature reviews.
Findings
Results of this study indicate that three distinct business process model testing types can be found in the literature: black/gray-box, regression and integration. Testing and verification approaches differ in aspects such as awareness of test data, coverage criteria and auxiliary representations used. However, most solutions pose notable hindrances, such as BPMN element limitations, that lead to limited practicality.
Research limitations/implications
The databases selected in the review protocol may have excluded relevant studies on this topic. More databases and gray literature could also be considered for inclusion in this review.
Originality/value
Three main originality aspects are identified in this study as follows: (1) the classification of process model testing types, (2) the future trends foreseen for BPMN model testing and verification and (3) the bPERFECT framework for testing business processes.
Details
Keywords
Mobile applications affect our everyday activities and have become more and more information centric. Effort estimation for mobile application is an essential factor to consider…
Abstract
Mobile applications affect our everyday activities and have become more and more information centric. Effort estimation for mobile application is an essential factor to consider in the development cycle. Due to feature complexities and size, effort estimation of mobile applications poses a continued challenge for developers. This paper attempts to adapt COSMIC Function Point and Unified Modeling Language (UML) techniques to estimate the size of a given mobile application. The COSMIC concepts capture data movements of the functional processes whereas the UML class analyzes them. We utilize the Use Case Diagrams, sequence diagrams and class diagrams for mapping the Function user requirements for sizing mobile applications. We further present a new size measurement technique; Unadjusted Mobile COSMIC Function points (UMCFP) to get the functional size of mobile application using Mobile Complex Factors as an input. In this study eight mobile applications were analyzed using UMCFP, Function Point Analysis and COSMIC Function Point. The results were compared with the actual size of previous Mobile application projects.
Details
Keywords
Paola Lara Machado, Montijn van de Ven, Banu Aysolmaz, Alexia Athanasopoulou, Baris Ozkan and Oktay Turetken
Business models are increasingly recognized as a concept to support innovation in organizations. The implementation and operation of a new or altered business model involves the…
Abstract
Purpose
Business models are increasingly recognized as a concept to support innovation in organizations. The implementation and operation of a new or altered business model involves the (re-)design of an organization's business processes and their successful execution. This study reviews and synthesizes the existing body of literature to guide organizations in systematically moving from a business model design to the implementation and operation of the business model through their underlying business processes.
Design/methodology/approach
A systematic literature review of the methods that bridge business models and business processes is performed. The selected 34 studies are classified according to the method's characteristics and the support in the design, implementation and operation of business models.
Findings
The results of the systematic review provide an overview of existing methods that organizations can adopt when moving from business model design into the implementation and operation of their business model using processes.
Originality/value
This work provides a comprehensive overview and detailed insight into the existing methods that align business models and business processes. It increases the understanding on how these two concepts can be synthesized to support more effective digital innovation in organizations. Based on the review results, knowledge gaps are identified and an agenda for future research bridging the fields of business models and business processes is proposed.
Details
Keywords
Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng
Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…
Abstract
Purpose
Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.
Design/methodology/approach
This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.
Findings
As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.
Originality/value
This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.
Details
Keywords
Elisabetta Colucci, Francesca Matrone, Francesca Noardo, Vanessa Assumma, Giulia Datola, Federica Appiotti, Marta Bottero, Filiberto Chiabrando, Patrizia Lombardi, Massimo Migliorini, Enrico Rinaldi, Antonia Spanò and Andrea Lingua
The study, within the Increasing Resilience of Cultural Heritage (ResCult) project, aims to support civil protection to prevent, lessen and mitigate disasters impacts on cultural…
Abstract
Purpose
The study, within the Increasing Resilience of Cultural Heritage (ResCult) project, aims to support civil protection to prevent, lessen and mitigate disasters impacts on cultural heritage using a unique standardised-3D geographical information system (GIS), including both heritage and risk and hazard information.
Design/methodology/approach
A top-down approach, starting from existing standards (an INSPIRE extension integrated with other parts from the standardised and shared structure), was completed with a bottom-up integration according to current requirements for disaster prevention procedures and risk analyses. The results were validated and tested in case studies (differentiated concerning the hazard and type of protected heritage) and refined during user forums.
Findings
Besides the ensuing reusable database structure, the filling with case studies data underlined the tough challenges and allowed proposing a sample of workflows and possible guidelines. The interfaces are provided to use the obtained knowledge base.
Originality/value
The increasing number of natural disasters could severely damage the cultural heritage, causing permanent damage to movable and immovable assets and tangible and intangible heritage. The study provides an original tool properly relating the (spatial) information regarding cultural heritage and the risk factors in a unique archive as a standard-based European tool to cope with these frequent losses, preventing risk.
Details
Keywords
P.J. White, Hannah R. Marston, Linda Shore and Robert Turner
In March 2020 the United Nations published an open brief for the creative community to propose interventions to the unfolding COVID-19 pandemic. However, when faced with…
Abstract
In March 2020 the United Nations published an open brief for the creative community to propose interventions to the unfolding COVID-19 pandemic. However, when faced with unprecedented wicked problems such as these, the rigour of design and creative processes can tested. COVID-19 has demonstrated how important human centred design responses are in understanding the worldviews and ecosystems of users. Ad hoc design responses or design hacks have demonstrated that they have a role to play in how we create our future individual, community and societal ecosystems.
In terms of age friendly design, this pandemic makes us envision what should be, furthermore, how we could create better products and services through technology. For our ageing communities “Cocooning” and other social restriction measures have exposed technological deficiencies for the needs of older people and opens up questions of our future preparedness for a growing ageing society. Now more than ever, designers need to understand the behavioural mind-set of older people in their own ecosystem and understand existing mental models.
In this opinion piece we posit what acts of design hacking can lead us to greater understanding of users mental models and therefore better understanding of technology needs for both older and younger adults. While presenting various examples of how design hacking is conducted by citizens and participants alike, it shows that it offers designers differing perspectives, experiences and inspiration for technology.
Details
Keywords
Judith Fauth, Tanya Bloch and Lucio Soibelman
Building permitting is mostly a manual, labor intensive and time-consuming process. Initiatives for streamlining the process are not always helpful since they often fail to…
Abstract
Purpose
Building permitting is mostly a manual, labor intensive and time-consuming process. Initiatives for streamlining the process are not always helpful since they often fail to address the core problems within the process. A framework for modeling the permitting process can be useful to identify bottlenecks, core challenges and best practices. Hence, the authors aim to demonstrate and validate a previously suggested workflow for permit process modeling using the permitting process in Israel as a test case.
Design/methodology/approach
The authors implement qualitative expert interviews for data acquisition. The collected data are then processed for a qualitative data analysis. The results of the analysis are then validated using a focus group workshop in the field of building permits. In the test case the focus group consisted of Israeli experts.
Findings
The authors present a detailed overview of the as-is building permit process in Israel and the existing challenges. Through this test case, the authors found that the framework is applicable in different countries and that it can provide valuable insights into the core problems within the process. In addition, application of the same framework in different countries can provide comparable results that would allow the authors to identify best practices.
Originality/value
The major contribution of this work is the development and validation of a framework for building permitting process modeling which can be used to identify existing challenges and bottlenecks in the process. Implementing a structured and unified approach provides an opportunity to easily compare processes in different countries to identify best practices.
Details
Keywords
Nicola Cobelli and Silvia Blasi
This paper explores the Adoption of Technological Innovation (ATI) in the healthcare industry. It investigates how the literature has evolved, and what are the emerging innovation…
Abstract
Purpose
This paper explores the Adoption of Technological Innovation (ATI) in the healthcare industry. It investigates how the literature has evolved, and what are the emerging innovation dimensions in the healthcare industry adoption studies.
Design/methodology/approach
We followed a mixed-method approach combining bibliometric methods and topic modeling, with 57 papers being deeply analyzed.
Findings
Our results identify three latent topics. The first one is related to the digitalization in healthcare with a specific focus on the COVID-19 pandemic. The second one groups up the word combinations dealing with the research models and their constructs. The third one refers to the healthcare systems/professionals and their resistance to ATI.
Research limitations/implications
The study’s sample selection focused on scientific journals included in the Academic Journal Guide and in the FT Research Rank. However, the paper identifies trends that offer managerial insights for stakeholders in the healthcare industry.
Practical implications
ATI has the potential to revolutionize the health service delivery system and to decentralize services traditionally provided in hospitals or medical centers. All this would contribute to a reduction in waiting lists and the provision of proximity services.
Originality/value
The originality of the paper lies in the combination of two methods: bibliometric analysis and topic modeling. This approach allowed us to understand the ATI evolutions in the healthcare industry.
Details
Keywords
Nicola Cobelli and Emanuele Blasioli
The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management…
Abstract
Purpose
The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management. Furthermore, this study aims to provide an overview of the existing resources in healthcare management and education and other developing interdisciplinary fields.
Design/methodology/approach
This work uses bibliometric analysis to conduct a comprehensive review to map the use of the unified theory of acceptance and use of technology (UTAUT) and the unified theory of acceptance and use of technology 2 (UTAUT2) research models in healthcare academic studies. Bibliometric studies are considered an important tool to evaluate research studies and to gain a comprehensive view of the state of the art.
Findings
Although UTAUT dates to 2003, our bibliometric analysis reveals that only since 2016 has the model, together with UTAUT2 (2012), had relevant application in the literature. Nonetheless, studies have shown that UTAUT and UTAUT2 are particularly suitable for understanding the reasons that underlie the adoption and non-adoption choices of eHealth services. Further, this study highlights the lack of a multidisciplinary approach in the implementation of eHealth services. Equally significant is the fact that many studies have focused on the acceptance and the adoption of eHealth services by end users, whereas very few have focused on the level of acceptance of healthcare professionals.
Originality/value
To the best of the authors’ knowledge, this is the first study to conduct a bibliometric analysis of technology acceptance and adoption by using advanced tools that were conceived specifically for this purpose. In addition, the examination was not limited to a certain era and aimed to give a worldwide overview of eHealth service acceptance and adoption.
Details