Current research in risk-aware business process management―overview, comparison, and gap analysis
S Suriadi, B Weiß, A Winkelmann… - … of the Association for …, 2014 - aisel.aisnet.org
The management of risk in business processes has been the subject of active research in
the past few years. Potentially, many benefits can be obtained by integrating the two …
the past few years. Potentially, many benefits can be obtained by integrating the two …
Real-time risk monitoring in business processes: A sensor-based approach
This article proposes an approach for real-time monitoring of risks in executable business
process models. The approach considers risks in all phases of the business process …
process models. The approach considers risks in all phases of the business process …
Risk measure propagation through organisational network
L Shabnam, F Haque, M Bhuiyan… - 2014 IEEE 38th …, 2014 - ieeexplore.ieee.org
In this paper we present a risk measurement methodology by incorporating actors'
dependency relationships with each other across the whole organisational model. We argue …
dependency relationships with each other across the whole organisational model. We argue …
Text-indicated writer verification using hidden Markov models
Y Yamazaki, T Nagao… - … Conference on Document …, 2003 - ieeexplore.ieee.org
We propose an HMM-based text-indicated writer verification method, which is based on a
challenge and response type of authentication process. In this method, a different text …
challenge and response type of authentication process. In this method, a different text …
Interface-oriented classification of DEVS models
C Thomas - Fifth Annual Conference on AI, and Planning in …, 1994 - ieeexplore.ieee.org
Model classification is a way to structure and handle knowledge about systems. Using the
models external message interface as the classification criterion lays emphasis on the fact …
models external message interface as the classification criterion lays emphasis on the fact …
[图书][B] Vulnerability identification errors in security risk assessments
S Taubenberger - 2014 - search.proquest.com
At present, companies rely on information technology systems to achieve their business
objectives, making them vulnerable to cybersecurity threats. Information security risk …
objectives, making them vulnerable to cybersecurity threats. Information security risk …
Citizen's charter driven service area improvement
AM Fortuito, M Bhuiyan, F Haque… - 2015 Asia-Pacific …, 2015 - ieeexplore.ieee.org
A government organisation's capability is reliant on its public service offerings in parallel
with acceptable satisfaction level of its service recipients. Government organisations utilise a …
with acceptable satisfaction level of its service recipients. Government organisations utilise a …
Enhancing public service delivery through organisational modeling
AM Fortuito, F Haque, L Shabnam, M Bhuiyan… - arXiv preprint arXiv …, 2016 - arxiv.org
Government organisations utilise a Citizen's Charter in order to furnish the public with
comprehensive details of their service offerings that defines how their overall organisational …
comprehensive details of their service offerings that defines how their overall organisational …
R-BPM: uma metodologia para gestão de riscos em iniciativas de BPM
FS FERREIRA - 2016 - bdtd.ibict.br
Na busca por agilidade, economia e qualidade em seus processos, um número crescente
de empresas tem adotado técnicas de Gerenciamento de Processos de Negócios (do …
de empresas tem adotado técnicas de Gerenciamento de Processos de Negócios (do …
Managing risk in process-aware information systems
R Conforti - 2014 - eprints.qut.edu.au
This research contributes a fully-operational approach for managing business process risk
in near real-time. The approach consists of a language for defining risks on top of process …
in near real-time. The approach consists of a language for defining risks on top of process …