Published: Oct 1, 2013
Converted to Gold OA:
DOI: 10.4018/ijismd.20131001pre
Volume 4
Marko Bajec, Johann Eder
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Bajec, Marko, and Johann Eder. "Special Issue from the Advanced Information Systems Engineering Workshops 2012." IJISMD vol.4, no.4 2013: pp.4-5. http://doi.org/10.4018/ijismd.20131001pre
APA
Bajec, M. & Eder, J. (2013). Special Issue from the Advanced Information Systems Engineering Workshops 2012. International Journal of Information System Modeling and Design (IJISMD), 4(4), 4-5. http://doi.org/10.4018/ijismd.20131001pre
Chicago
Bajec, Marko, and Johann Eder. "Special Issue from the Advanced Information Systems Engineering Workshops 2012," International Journal of Information System Modeling and Design (IJISMD) 4, no.4: 4-5. http://doi.org/10.4018/ijismd.20131001pre
Export Reference
Published: Oct 1, 2013
Converted to Gold OA:
DOI: 10.4018/ijismd.2013100101
Volume 4
Constantinos Giannoulis, Eric-Oluf Svee, Jelena Zdravkovic
A core concern within Business-IT alignment is coordinating strategic initiatives and plans with Information Systems (IS). Substantial work has been done on linking strategy to requirements for IS...
Show More
A core concern within Business-IT alignment is coordinating strategic initiatives and plans with Information Systems (IS). Substantial work has been done on linking strategy to requirements for IS development, but it has usually been focused on the core value exchanges offered by the business, and thus overlooking other aspects that influence the implementation of strategy. One of these, consumer preferences, has been proven to influence the successful provisioning of the business's customer value proposition, and this study aims to establish a conceptual link between both strategy and consumer preferences to system requirements. The core contention is that reflecting consumer preferences through business strategy in system requirements allows for the development of aligned systems, and therefore systems that better support a consumer orientation. The contribution of this paper is an approach to establish such alignment, with this being accomplished through the proposal of a consumer preference meta-model mapped to a business strategy meta-model further linked to a system requirements technique. The validity of this proposal is demonstrated through a case study carried out within an institution of higher education in Sweden.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Giannoulis, Constantinos, et al. "Capturing Consumer Preference in System Requirements Through Business Strategy." IJISMD vol.4, no.4 2013: pp.1-26. http://doi.org/10.4018/ijismd.2013100101
APA
Giannoulis, C., Svee, E., & Zdravkovic, J. (2013). Capturing Consumer Preference in System Requirements Through Business Strategy. International Journal of Information System Modeling and Design (IJISMD), 4(4), 1-26. http://doi.org/10.4018/ijismd.2013100101
Chicago
Giannoulis, Constantinos, Eric-Oluf Svee, and Jelena Zdravkovic. "Capturing Consumer Preference in System Requirements Through Business Strategy," International Journal of Information System Modeling and Design (IJISMD) 4, no.4: 1-26. http://doi.org/10.4018/ijismd.2013100101
Export Reference
Published: Oct 1, 2013
Converted to Gold OA:
DOI: 10.4018/ijismd.2013100102
Volume 4
Rob Christiaanse, Joris Hulstijn
Much compliance effort concerns adherence to contracts. Parties to a contract need to make sure that the other parties will deliver. To this end they may require additional controls in the business...
Show More
Much compliance effort concerns adherence to contracts. Parties to a contract need to make sure that the other parties will deliver. To this end they may require additional controls in the business process to monitor delivery and induce contractual penalties when needed. Controls have costs. In this paper the authors argue that introducing fully automated controls will help to reduce control costs, because (i) they can prevent misstatements (compliance by design) or (ii) they increase the quality of evidence and thereby reduce the audit risk for the external auditor and corresponding audit fees. The line of reasoning is illustrated by a case study of the implementation process of automated controls on the procurement process for public transport services for the elderly and disabled. This is a complex and heavily regulated domain. The case study indicates that control automation makes monitoring compliance to contracts in such complex domains feasible and that using control automation can in fact reduce the costs of control.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Christiaanse, Rob, and Joris Hulstijn. "Control Automation to Reduce Costs of Control." IJISMD vol.4, no.4 2013: pp.27-47. http://doi.org/10.4018/ijismd.2013100102
APA
Christiaanse, R. & Hulstijn, J. (2013). Control Automation to Reduce Costs of Control. International Journal of Information System Modeling and Design (IJISMD), 4(4), 27-47. http://doi.org/10.4018/ijismd.2013100102
Chicago
Christiaanse, Rob, and Joris Hulstijn. "Control Automation to Reduce Costs of Control," International Journal of Information System Modeling and Design (IJISMD) 4, no.4: 27-47. http://doi.org/10.4018/ijismd.2013100102
Export Reference
Published: Oct 1, 2013
Converted to Gold OA:
DOI: 10.4018/ijismd.2013100103
Volume 4
Jens Kolb, Benjamin Rudner, Manfred Reichert
Contemporary business process modeling tools provide menu-based user interfaces for defining and visualizing process models. Such menu-based interactions have been optimized for applications running...
Show More
Contemporary business process modeling tools provide menu-based user interfaces for defining and visualizing process models. Such menu-based interactions have been optimized for applications running on desktop computers, but are limited regarding their use on multi-touch devices. At the same time, the widespread use of mobile devices in daily business life as well as their multi-touch capabilities offer promising perspectives for intuitively defining and changing business process models. Additionally, multi-touch tables will foster collaborative business process modeling based on natural as well as intuitive gestures and interactions. This paper presents the results of an experiment that investigated the way users define and change business process models using multi-touch devices. Based on experiment results, a core gesture set is designed enabling the easy definition and change of business process models with multi-touch devices. Finally, a proof-of-concept implementation of this core gesture set is presented. Overall, gesture-based process modeling and multi-touch devices will foster new ways of (collaborative) business process modeling.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kolb, Jens, et al. "Gesture-Based Process Modeling Using Multi-Touch Devices." IJISMD vol.4, no.4 2013: pp.48-69. http://doi.org/10.4018/ijismd.2013100103
APA
Kolb, J., Rudner, B., & Reichert, M. (2013). Gesture-Based Process Modeling Using Multi-Touch Devices. International Journal of Information System Modeling and Design (IJISMD), 4(4), 48-69. http://doi.org/10.4018/ijismd.2013100103
Chicago
Kolb, Jens, Benjamin Rudner, and Manfred Reichert. "Gesture-Based Process Modeling Using Multi-Touch Devices," International Journal of Information System Modeling and Design (IJISMD) 4, no.4: 48-69. http://doi.org/10.4018/ijismd.2013100103
Export Reference
Published: Oct 1, 2013
Converted to Gold OA:
DOI: 10.4018/ijismd.2013100104
Volume 4
Claudia Diamantini, Domenico Potena, Maurizio Proietti, Fabrizio Smith, Emanuele Storti, Francesco Taglino
Knowledge management is a crucial aspect for enterprises that want to effectively cope with business innovation. However, the full control of the knowledge asset is often missing due to the lack of...
Show More
Knowledge management is a crucial aspect for enterprises that want to effectively cope with business innovation. However, the full control of the knowledge asset is often missing due to the lack of precise organizational models, policies, and proper technologies, especially in Virtual Enterprises (VEs), which are characterized by heterogeneous partners with different policies, skills and know-how. For such reasons, the need for technologies that enable knowledge sharing, efficient access to knowledge resources, and interoperability is felt as primary. This work proposes a semantics-based infrastructure aimed at supporting effective knowledge management for business innovation in VEs. Knowledge resources are formally represented and stored in a semantic layer, which is exploited by a set of semantic services for enabling efficient retrieval and reasoning capabilities to derive additional knowledge.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Diamantini, Claudia, et al. "A Semantic Framework for Knowledge Management in Virtual Innovation Factories." IJISMD vol.4, no.4 2013: pp.70-92. http://doi.org/10.4018/ijismd.2013100104
APA
Diamantini, C., Potena, D., Proietti, M., Smith, F., Storti, E., & Taglino, F. (2013). A Semantic Framework for Knowledge Management in Virtual Innovation Factories. International Journal of Information System Modeling and Design (IJISMD), 4(4), 70-92. http://doi.org/10.4018/ijismd.2013100104
Chicago
Diamantini, Claudia, et al. "A Semantic Framework for Knowledge Management in Virtual Innovation Factories," International Journal of Information System Modeling and Design (IJISMD) 4, no.4: 70-92. http://doi.org/10.4018/ijismd.2013100104
Export Reference
Published: Oct 1, 2013
Converted to Gold OA:
DOI: 10.4018/ijismd.2013100105
Volume 4
Olga Altuhhov, Raimundas Matulevičius, Naved Ahmed
Business process modelling is one of the major aspects in the modern information system development. Recently business process model and notation (BPMN) has become a standard technique to support...
Show More
Business process modelling is one of the major aspects in the modern information system development. Recently business process model and notation (BPMN) has become a standard technique to support this activity. Typically the BPMN notations are used to understand enterprise's business processes. However, limited work exists regarding how security concerns are addressed during the management of the business processes. This is a problem, since both business processes and security should be understood in parallel to support a development of the secure information systems. In the previous work we have analysed BPMN with respect to the domain model of the IS security risk management (ISSRM) and showed how the language constructs could be aligned to the concepts of the ISSRM domain model. In this paper the authors propose the BPMN extensions for security risk management based on the BPMN alignment to the ISSRM concepts. We illustrate how the extended BPMN could express assets, risks and risk treatment on few running examples related to the Internet store regarding the asset confidentiality, integrity and availability. Our proposal would allow system analysts to understand how to develop security requirements to secure important assets defined through business processes. The paper opens the possibility for business and security model interoperability and the model transformation between several modelling approaches (if these both are aligned to the ISSRM domain model).
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Altuhhov, Olga, et al. "An Extension of Business Process Model and Notation for Security Risk Management." IJISMD vol.4, no.4 2013: pp.93-113. http://doi.org/10.4018/ijismd.2013100105
APA
Altuhhov, O., Matulevičius, R., & Ahmed, N. (2013). An Extension of Business Process Model and Notation for Security Risk Management. International Journal of Information System Modeling and Design (IJISMD), 4(4), 93-113. http://doi.org/10.4018/ijismd.2013100105
Chicago
Altuhhov, Olga, Raimundas Matulevičius, and Naved Ahmed. "An Extension of Business Process Model and Notation for Security Risk Management," International Journal of Information System Modeling and Design (IJISMD) 4, no.4: 93-113. http://doi.org/10.4018/ijismd.2013100105
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJISMD should be directed to the attention of:
Submission-Related InquiriesAll inquiries regarding IJISMD should be directed to the attention of:Dr. Mehdi Khosrow-Pour
Editor-in-Chief
International Journal of Information System Modeling and Design
Email:
journaleditor@igi-global.comm
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100