For the integrated implementation of Business Process Management and supporting information systems many methods are available. Most of these methods, however, apply a one-size fits all approach and do not take into account the specific situation of the organization in which an information system is to be implemented. These situational factors, however, strongly determine the success of any implementation project. In this paper a method is provided that establishes situational factors of and their influence on implementation methods. The provided method enables a more successful implementation project, because the project team can create a more suitable implementation method for business process management system implementation projects.
DOCUMENT
When it comes to hard to solve problems, the significance of situational knowledge construction and network coordination must not be underrated. Professional deliberation is directed toward understanding, acting and analysis. We need smart and flexible ways to direct systems information from practice to network reflection, and to guide results from network consultation to practice. This article presents a case study proposal, as follow-up to a recent dissertation about online simulation gaming for youth care network exchange (Van Haaster, 2014).
DOCUMENT
Illicit data markets have emerged on Telegram, a popular online instant messaging application, bringing together thousands of users worldwide in an unregulated exchange of sensitive data. These markets operate through vendors who offer enormous quantities of such data, from personally identifiable information to financial data, while potential customers bid for these valuable assets. This study describes how Telegram data markets operate and discusses what interventions could be used to disrupt them. Using crime script analysis, we observed 16 Telegram meeting places encompassing public and private channels and groups. We obtained information about how the different meeting places function, what are their inside rules, and what tactics are employed by users to advertise and trade data. Based on the crime script, we suggest four feasible situational crime prevention measures to help disrupt these markets. These include taking down the marketplaces, reporting them, spamming and flooding techniques, and using warning banners. This is a post-peer-review, pre-copyedit version of an article published in Trends in organized crime . The final authenticated version is available online at https://doi.org/10.1007/s12117-024-09532-6
DOCUMENT
From the article: Though organizations are increasingly aware that the huge amounts of digital data that are being generated, both inside and outside the organization, offer many opportunities for service innovation, realizing the promise of big data is often not straightforward. Organizations are faced with many challenges, such as regulatory requirements, data collection issues, data analysis issues, and even ideation. In practice, many approaches can be used to develop new datadriven services. In this paper we present a first step in defining a process for assembling data-driven service development methods and techniques that are tuned to the context in which the service is developed. Our approach is based on the situational method engineering approach, tuning it to the context of datadriven service development. Published in: Reinhartz-Berger I., Zdravkovic J., Gulden J., Schmidt R. (eds) Enterprise, Business-Process and Information Systems Modeling. BPMDS 2019, EMMSAD 2019. Lecture Notes in Business Information Processing, vol 352. Springer. The final authenticated version of this paper is available online at https://doi.org/10.1007/978-3-030-20618-5_11.
MULTIFILE
Insider ethnographic analysis is used to analyze change processes in an engineering department. Distributed leadership theory is used as conceptual framework.
DOCUMENT
A case study and method development research of online simulation gaming to enhance youth care knowlegde exchange. Youth care professionals affirm that the application used has enough relevance as an additional tool for knowledge construction about complex cases. They state that the usability of the application is suitable, however some remarks are given to adapt the virtual environment to the special needs of youth care knowledge exchange. The method of online simulation gaming appears to be useful to improve network competences and to explore the hidden professional capacities of the participant as to the construction of situational cognition, discourse participation and the accountability of intervention choices.
DOCUMENT
Decisions and business rules are essential Components of an organization. Combined, these components form a basis for securing the implementation of new laws, regulations and internal policies into processes, work instructions and information systems. To ensure proper implementation, business rule types must be taken into account, as the functions per type may be different. The current body of knowledge on decision and business rule management offers some insights into different types of business rules, however, these types are often presented as a secondary focus of a contribution or set in stone without proper evidence supporting these claims. This study therefore aims to explore the different business rule types utilized in the body of knowledge as well as practice. This will form a basis to determine possible overlap and inconsistencies and aid in establishing the functional differences between the defined business rule types. By applying a literature review, semi-structured interviews and secondary data analysis, we observed that the current body of knowledge shows serious diffusion with regards to business rule types, the same holds for practice. Therefore, future research should focus to research these differences in detail with the aim to harmonize the proliferation of business rule types.
DOCUMENT
Small and Medium Enterprises (SME) comprise 99% of the European-economy, though, most research and implementation methods concerning Business Process Management Systems (BPMS) focus on large enterprises. We create a BPMS implementation method that is suitable for SMEs. Based on three existing BPMS implementation methods and by incorporating differentiators of SMEs and large enterprises a BPMS implementation method is constructed. The constructed method is validated through a series of interviews with BPMS implementation experts. Experts agree with the constructed method though discussion arise on a more detailed level of activities in the method.
MULTIFILE
Posterbijdrage conferentie EARLI SIG 14, 11-14 september 2018, Genève Although literature shows the important supportive role of experienced colleagues to stimulate novices’ workplace learning, the question of how this support is provided is usually answered in general terms (e.g. Mikkonen et al. 2017; Tynjälä 2008). Therefore, this study aims to explore how members of vocational communities, both individually and as a collective, enact specific pedagogic practices to contribute to novices’ learning. The systematic literature review that will be presented in the interactive poster session is the first study of a PhD project and provides an overview of situational pedagogic practices which attempt to support novices’ learning at the workplace.
DOCUMENT