Mass-customization challenges the one-size-fits-all assumption of mass production, allowing customers to specify the options that best fit their requirements when choosing a product or a service. In business process management, to achieve mass-customization, providers offer to their customers the opportunity to customize the way in which a process will be enacted. We focus on monitoring as a specific customization aspect. We propose a multidimensional classification of modeling patterns for customized monitoring infrastructures. Patterns enable the provider to offer a set of customizable options to customers and design a monitoring infrastructure that fits the preferences specified by customers on such options. An example in the online advertising industry demonstrates how our framework can improve the services currently offered by providers.
DOCUMENT
Many quality aspects of software systems are addressed in the existing literature on software architecture patterns. But the aspect of system administration seems to be a bit overlooked, even though it is an important aspect too. In this work we present three software architecture patterns that, when applied by software architects, support the work of system administrators: PROVIDE AN ADMINISTRATION API, SINGLE FILE LOCATION, and CENTRALIZED SYSTEM LOGGING. PROVIDE AN ADMINISTRATION API should solve problems encountered when trying to automate administration tasks. The SINGLE FILE LOCATION pattern should help system administrators to find the files of an application in one (hierarchical) place. CENTRALIZED SYSTEM LOGGING is useful to prevent coming up with several logging formats and locations. Abstract provided by the authors. Published in PLoP '13: Proceedings of the 20th Conference on Pattern Languages of Programs ACM.
DOCUMENT
This survey is about recognizing patterns in the way Small and Medium Enterprises (SMEs) organize their procurement activities. The scope of the survey is limited to the key commodities of the SME.A key commodity is defined as the purchased product or service group which is essential for realizing the value proposition for the customers of the SME.Prior outcome of our research indicated the existence of four procurement oriented patterns in SMEs. 4 Procurement Oriented Patterns where part of the study: Pattern 1 Focal company: ICT turn-key designerValue proposition of the focal company: ICT Design and assembly of offices on a high quality level at a reasonable price. Operational excellence: standardization in commodities, low transaction costs internally and externallyPurchased key commodity: Standard ICT software and hardwarePattern 2 Focal company: Horse shoes manufacturerValue proposition of the focal company: Standard horse shoes assortment at reasonable prices in a competitive environmentPurchased key commodity: Standard quality iron, reliable deliveryPattern 3 Focal company: IT innovation driven companyValue proposition of the focal company: Developing innovative software made applicable for practical usage in devices at a reasonable pricePurchased key commodity: Delivering applicable solutions on the bases of regular soft- and hardware, to enable the companies’ innovative software function in practicePattern 4 Focal company: designer and manufacturer of trailersValue proposition of the focal company: Designing and manufacturing trailers tailor made for specific requirements of customersPurchased key commodity: Designing and manufacturing axles which align to the specific trailer wishes of the customer of the focal companyFINDINGS Pattern recognitionAbout 50 % of the respondents recognized the four presented patterns from own experience and/or read literature. Respondents also suggested pattern variants. It is concluded that this Delphi study strengthens the view that these patterns exist in SMEs. Further research may include further empirical testing of these patterns and their variants. Perceived strengths or weaknesses. Respondents mentioned a wide variety of strengths and weaknesses of the patterns. No clear conclusions can be drawn from this data. Adequacy of the pattern descriptions. One of the outcomes of this Delphi study is an improved conceptual framework for describing procurement activity patterns. This framework can be used for collecting SME data in future research, for example by modifying the existing survey questions which are used in the WIM research program to describe SME procurement activities. The improved model includes more variables and values than the initial model. Thus future research may lead to more detailed patterns descriptions. Missing patterns and pattern variantsApart from the suggested pattern variants, respondents do not miss patterns which are quite different from the four patterns suggested by the research team. Methodological remarksThe Delphi study method did not allow for fast feedback on panel member contributions and fast group think processes. For the future it is advised to consider other methods in similar cases, for example the World Cafe method.
DOCUMENT
With artificial intelligence (AI) systems entering our working and leisure environments with increasing adaptation and learning capabilities, new opportunities arise for developing hybrid (human-AI) intelligence (HI) systems, comprising new ways of collaboration. However, there is not yet a structured way of specifying design solutions of collaboration for hybrid intelligence (HI) systems and there is a lack of best practices shared across application domains. We address this gap by investigating the generalization of specific design solutions into design patterns that can be shared and applied in different contexts. We present a human-centered bottom-up approach for the specification of design solutions and their abstraction into team design patterns. We apply the proposed approach for 4 concrete HI use cases and show the successful extraction of team design patterns that are generalizable, providing re-usable design components across various domains. This work advances previous research on team design patterns and designing applications of HI systems.
MULTIFILE
Parents who grew up without digital monitoring have a plethora of parental monitoring opportunities at their disposal. While they can engage in surveillance practices to safeguard their children, they also have to balance freedom against control. This research is based on in-depth interviews with eleven early adolescents and eleven parents to investigate everyday negotiations of parental monitoring. Parental monitoring is presented as a form of lateral surveillance because it entails parents engaging in surveillance practices to monitor their children. The results indicate that some parents are motivated to use digital monitoring tools to safeguard and guide their children, while others refrain from surveillance practices to prioritise freedom and trust. The most common forms of surveillance are location tracking and the monitoring of digital behaviour and screen time. Moreover, we provide unique insights into the use of student tracking systems as an impactful form of control. Early adolescents negotiate these parental monitoring practices, with responses ranging from acceptance to active forms of resistance. Some children also monitor their parents, showcasing a reciprocal form of lateral surveillance. In all families, monitoring practices are negotiated in open conversations that also foster digital resilience. This study shows that the concepts of parental monitoring and lateral surveillance fall short in grasping the reciprocal character of monitoring and the power dynamics in parent-child relations. We therefore propose that monitoring practices in families can best be understood as family surveillance, providing a novel concept to understand how surveillance is embedded in contemporary media practices among interconnected family members.
MULTIFILE
From the article: Abstract—By using agent technology, a versatile and modular monitoring system can be built. In this paper, such a multiagentbased monitoring system will be described. The system can be trained to detect several conditions in combination and react accordingly. Because of the distributed nature of the system, the concept can be used in many situations, especially when combinations of different sensor inputs are used. Another advantage of the approach presented in this paper is the fact that every monitoring system can be adapted to specific situations. As a case-study, a health monitoring system will be presented.
DOCUMENT
Continuous monitoring, continuous auditing and continuous assurance are three methods that utilize a high degree of business intelligence and analytics. The increased interest in the three methods has led to multiple studies that analyze each method or a combination of methods from a micro-level. However, limited studies have focused on the perceived usage scenarios of the three methods from a macro level through the eyes of the end-user. In this study, we bridge the gap by identifying the different usage scenarios for each of the methods according to the end-users, the accountants. Data has been collected through a survey, which is analyzed by applying a nominal analysis and a process mining algorithm. Results show that respondents indicated 13 unique usage scenarios, while not one of the three methods is included in all of the 13 scenarios, which illustrates the diversity of opinions in accountancy practice in the Netherlands.
DOCUMENT
Wereldwijd onderzoek: Hoe gebruiken nieuwsmedia social media? Jongeren lezen geen krant meer, ze kijken op hun smartphone die ze altijd bij de hand hebben. Binnen het lectoraat social media en reputatiemanagement van NHL hogeschool te Leeuwarden heeft een groep internationale studenten in 12 landen onderzoek gedaan. Hierbij hebben ze meer dan 150 social media sites bestudeerd van nieuws media. De resultaten maken deel uit van een internationaal onderzoek van NHL Hogeschool en Haaga Helia University. De onderzoeksvraag was: Wat speelt zich af in de nieuwsmedia? Persbureaus kunnen het overzicht gebruiken om hun social media te optimaliseren. En voor ieder die journalistiek een warm hart toedraagt is het interessante informatie over de nieuwsmedia in een overgangssituatie (2nd edition)
DOCUMENT
Movement behaviors, that is, both physical activity and sedentary behavior, are independently associated with health risks. Although both behaviors have been investigated separately in people after stroke, little is known about the combined movement behavior patterns, differences in these patterns between individuals, or the factors associated with these patterns. Therefore, the objectives of this study are (1) to identify movement behavior patterns in people with first-ever stroke discharged to the home setting and (2) to explore factors associated with the identified patterns.
DOCUMENT