Identifying Relevant Resources and Relevant Capabilities of Informal Processes

被引:0
|
作者
Sungur, C. Timurhan [1 ]
Breitenbuecher, Uwe [1 ]
Kopp, Oliver [2 ]
Leymann, Frank [1 ]
Weiss, Andreas [1 ]
机构
[1] Univ Stuttgart, Inst Architecture Applicat Syst, Stuttgart, Germany
[2] Univ Stuttgart, Inst Parallel & Distributed Syst, Stuttgart, Germany
关键词
Informal Processes; Unstructured Processes; Resource Discovery; Capability Discovery; Relevant Resources; Relevant Capabilities; KNOWLEDGE-INTENSIVE PROCESSES; PATTERNS;
D O I
10.5220/0006300702950307
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Achieving goals of organizations requires executing certain business processes. Moreover, the effectiveness and the efficiency of organizations are affected by how their business processes are enacted. Thus, increasing the performance of business processes is in the interest of every organization. Interestingly, resources and their capabilities impacting past enactments of business processes positively or negatively can similarly have a positive or a negative impact in their future executions. Therefore, in our former work, we demonstrated a systematic method for identifying such resources and capabilities of business processes using interactions between resources of business processes without detailing the concepts required for this identification. In this work, we fill this gap by presenting a conceptual framework including concepts required for identifying resources possibly impacting business processes and capabilities of these resources based on their interactions. Furthermore, we present means of quantifying the significance of resources and their capabilities for business processes. To evaluate the identified resources and capabilities with their significance, we compare the results of the case study on the Apache jclouds project from our former work with the data collected through a survey. The results show that our system can estimate the actual values with 18% of a mean absolute percentage error. Last but not least, we describe how the presented conceptual framework is implemented and used in organizations.
引用
收藏
页码:295 / 307
页数:13
相关论文
共 50 条
  • [1] Identifying Relevant Resources and Relevant Capabilities of Collaborations - A Case Study
    Sungur, C. Timurhan
    Breitenbuecher, Uwe
    Kopp, Oliver
    Leymann, Frank
    Song, Mozi
    Weiss, Andreas
    Mayr-Dorn, Christoph
    Dustdar, Schahram
    [J]. 2016 IEEE 20TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING WORKSHOP (EDOCW), 2016, : 352 - 355
  • [2] Identifying Relevant Cross-Layer Interactions in Cognitive Processes
    Facchini, Christian
    Granelli, Fabrizio
    da Fonseca, Nelson L. S.
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [3] THE VOICE OF INFORMAL ENTREPRENEURS: RESOURCES AND CAPABILITIES PERSPECTIVE
    Khan, Eijaz Ahmed
    [J]. JOURNAL OF DEVELOPMENTAL ENTREPRENEURSHIP, 2018, 23 (03)
  • [4] TOWARDS THE DETERMINATION OF CAPABILITIES RELEVANT FOR EXPERT THINKING
    Krnjaic, Zora
    [J]. ZBORNIK INSTITUTA ZA PEDAGOSKA ISTRAZIVANJA, 2006, 38 (01): : 45 - 59
  • [5] IDENTIFYING CLINICALLY RELEVANT CAROTID DISEASE
    ACKERMAN, RH
    CANDIA, MR
    [J]. STROKE, 1994, 25 (01) : 1 - 3
  • [6] Identifying relevant studies in software engineering
    Zhang, He
    Babar, Muhammad All
    Tell, Paolo
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2011, 53 (06) : 625 - 637
  • [7] IDENTIFYING CLINICALLY RELEVANT CAROTID DISEASE
    ALEXANDER, TH
    [J]. STROKE, 1995, 26 (02) : 332 - 333
  • [8] Identifying Relevant Data in RDF Sources
    Chevallier, Zoe
    Kedad, Zoubida
    Finance, Beatrice
    Chaillan, Frederic
    [J]. RESEARCH CHALLENGES IN INFORMATION SCIENCE, PT II, RCIS 2024, 2024, 514 : 92 - 99
  • [9] IDENTIFYING RELEVANT STUDIES FOR SYSTEMATIC REVIEWS
    COUNSELL, C
    FRASER, H
    [J]. BRITISH MEDICAL JOURNAL, 1995, 310 (6972): : 126 - 126
  • [10] Identifying Relevant Messages for Social TV
    Li, Weibo
    Zhang, Chunhong
    Qiu, Xiaofeng
    Ji, Yang
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 288 - 292