Business process modelling challenges and solutions: a literature review

Y Alotaibi - Journal of intelligent manufacturing, 2016 - Springer
We have presented a review of the challenges facing business PM. These challenges are
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …

Survey of business process management: challenges and solutions

Y Alotaibi, F Liu - Enterprise Information Systems, 2017 - Taylor & Francis
The current literature shows that creating a good framework on business process model
(PM) is not an easy task. A successful business PM should have the ability to ensure …

Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach

A Rodríguez, IGR de Guzmán… - Information and …, 2010 - Elsevier
CONTEXT: Model-Driven Development (MDD) is an alternative approach for information
systems development. The basic underlying concept of this approach is the definition of …

Secure business process model specification through a UML 2.0 activity diagram profile

A Rodríguez, E Fernández-Medina, J Trujillo… - Decision Support …, 2011 - Elsevier
Business processes have become important resources, both for an enterprise's performance
and to enable it to maintain its competitiveness. The languages used for business process …

A comparison of software design security metrics

D Mellado, E Fernández-Medina… - Proceedings of the Fourth …, 2010 - dl.acm.org
A lack of security metrics signifies that it is not possible to measure the success of security
policies, mechanisms and implementations, and security cannot, in turn, be improved if it …

CIM to PIM transformation: A reality

A Rodríguez, E Fernández-Medina… - … II: Volume 2 IFIP TC 8 WG …, 2008 - Springer
Within the scope of MDA, the model transformation is orientated towards solving the
problems of time, cost and quality associated with software creation. Moreover, business …

A novel secure business process modeling approach and its impact on business performance

Y Alotaibi, F Liu - Information Sciences, 2014 - Elsevier
The existing information system (IS) development methods do not meet the requirements to
resolve security-related IS problems and they fail to provide for the successful integration of …

Enhancing secure business process design with security process patterns

N Argyropoulos, H Mouratidis, A Fish - Software and Systems Modeling, 2020 - Springer
Business process definition and analysis are an important activity for any organisation. As
research has demonstrated, well-defined business processes can reduce cost, improve …

Formalizing linguistic conventions for conceptual models

J Becker, P Delfmann, S Herwig, Ł Lis… - Conceptual Modeling-ER …, 2009 - Springer
A precondition for the appropriate analysis of conceptual models is not only their syntactic
correctness but also their semantic comparability. Assuring comparability is challenging …

Specifying security requirements of context aware system using UML

S Almutairi, G Bella… - … Conference on Digital …, 2012 - ieeexplore.ieee.org
Unified Modeling Language (UML) is an effective tool to model information systems and to
develop effective system specifications. Context Aware systems possess a dynamic …