Search results

1 – 10 of 39
Article
Publication date: 3 June 2024

Mariam Ben Hassen, Mohamed Turki and Faiez Gargouri

This paper introduces the problematic of the SBP modeling. Our objective is to provide a conceptual analysis related to the concept of SBP. This facilitates, on the one hand…

Abstract

Purpose

This paper introduces the problematic of the SBP modeling. Our objective is to provide a conceptual analysis related to the concept of SBP. This facilitates, on the one hand, easier understanding by business analysts and end-users, and one the other hand, the integration of the new specific concepts relating to the SBP/BPM-KM domains into the BPMN meta-model (OMG, 2013).

Design/methodology/approach

We propose a rigorous characterization of SBP (Sensitive Business Processes) (which distinguishes it from classic, structured and conventional BPs). Secondly, we propose a multidimensional classification of SBP modeling aspects and requirements to develop expressive, comprehensive and rigorous models. Besides, we present an in-depth study of the different modeling approaches and languages, in order to analyze their expressiveness and their abil-ity to perfectly and explicitly represent the new specific requirements of SBP modeling. In this study, we choose the better one positioned nowadays, BPMN 2.0, as the best suited standard for SBP representation. Finally, we propose a semantically rich conceptualization of a SBP organized in core ontology.

Findings

We defined a rigorous conceptual specification for this type of BP, organized in a multi-perspective formal ontology, the Core Ontology of Sensitive Business Processes (COSBP). This reference ontology will be used to define a generic BP meta-model (BPM4KI) further specifying SBPs. The objective is to obtain an enriched consensus modeling covering all generic concepts, semantic relationships and properties needed for the exploitation of SBPs, known as core modeling.

Originality/value

This paper introduces the problem of conceptual analysis of SBPs for (crucial) knowledge identification and management. These processes are highly complex and knowledge-intensive. The originality of this contribution lies in the multi-dimensional approach we have adopted for SBP modeling as well as the definition of a Core Ontology of Sensitive Business Processes (COSBP) which is very useful to extend the BPMN notation for knowledge management.

Details

Business Process Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 25 April 2024

Jayme Stewart, Jessie Swanek and Adelle Forth

Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying…

Abstract

Purpose

Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying that perpetrators target them repeatedly. Indeed, research reveals specific traits (e.g. submissiveness) and behaviors (e.g. gait) related to past victimization or vulnerability. The purpose of this study is to explore the link between personality traits, self-assessed vulnerability and nonverbal cues.

Design/methodology/approach

In all, 40 undergraduate Canadian women were videotaped while recording a dating profile. Self-report measures of assertiveness, personality traits and vulnerability ratings for future sexual or violent victimization were obtained following the video-recording. The videotape was coded for nonverbal behaviors that have been related to assertiveness or submissiveness.

Findings

Self-perceived sexual vulnerability correlated with reduced assertiveness and dominance and increased emotionality (e.g. fear and anxiety). Additionally, nonverbal behaviors differed based on personality traits: self-touch was linked to lower assertiveness, dominance and extraversion and higher submissiveness, emotionality and warm-agreeableness.

Originality/value

To the best of the authors’ knowledge, this is the first study of its kind to consider the relationships between personality, self-perceived vulnerability and nonverbal behaviors among college-aged women. Potential implications, including enhancing autonomy and self-efficacy, are discussed.

Details

Journal of Criminal Psychology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 11 June 2024

Tatiane Neves Lopes, Renata Mendes de Araujo, Tadeu Moreira de Classe and Flávio dos Santos Sant'Anna

Business process training is a crucial activity in the business process management lifecycle, performed whenever an organization needs to train workers about how to carry out…

Abstract

Purpose

Business process training is a crucial activity in the business process management lifecycle, performed whenever an organization needs to train workers about how to carry out their activities according to defined processes, after significant process changes, or whenever new workers come on board. Due to their motivational character, serious games have been understood as an unconventional alternative to support training in organizational processes. Still, methodologies to design serious digital games specifically for business process training are missing in the literature. This research paper presents a method – Play Your Process for Training (PYP4Training) – for designing digital games for business process training.

Design/methodology/approach

The research is guided by design science research methodologies and comprises the adaptation of Play Your Process (PYP), a method for designing business process-based digital games (BPBDG). PYP activities and supporting tools were shaped to cope with the specific requirements of BPBDG design for process training purposes, bringing to light a new method: PYP4Training.

Findings

PYP4Training was evaluated by designing a BPBDG for training a heavy equipment maintenance process in a multinational mining company. The game was evaluated by process owners and actors who reported a positive perception of the game as an option for process training. However, there is still space for improving trainees' engagement.

Originality/value

The research proposes an innovative way for business process training using digital games. Nevertheless, literature shows a lack of systematic procedures to build such games and results about their use.

Details

Business Process Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 8 August 2023

Aamir Rashid, Rizwana Rasheed and Noor Aina Amirah

Supply chain collaboration (SCC) benefits organizational performance (OP). Although it is complex, it is also hard to implement and measure collaborative initiatives in the field…

Abstract

Purpose

Supply chain collaboration (SCC) benefits organizational performance (OP). Although it is complex, it is also hard to implement and measure collaborative initiatives in the field of the supply chain. This study aims to examine the role of information technology (IT) and people’s involvement in OP through the mediation of supply chain collaboration.

Design/methodology/approach

This study used a deductive and quantitative approach to test the research hypotheses. Data was collected from 249 supply chain professionals working at various manufacturing firms.

Findings

This research found a significant effect of IT on supply chain collaboration. Similarly, people involvement (PI) also significantly influenced the supply chain collaboration. For the mediation hypotheses, SCC significantly mediates the relationships between two independent variables (IT and PI) and OP. Furthermore, the full mediation of SCC occurred.

Originality/value

This study provides a framework emphasizing manufacturing firms’ practices, SCC and OP. The “people involvement” was found as a novel variable in the tested model using the resource-based view as a supporting theory. The research findings can benefit the professionals working on supply chain business processes to improve OP.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Open Access
Article
Publication date: 27 October 2023

Komeil Ali Taghavi and Mohammadreza Mashayekh

The description of “blockchain banking”, the determination of “the sub-processes” of “blockchain banking” as a “business process”, and the assessment of “maturity level” in…

Abstract

Purpose

The description of “blockchain banking”, the determination of “the sub-processes” of “blockchain banking” as a “business process”, and the assessment of “maturity level” in Parsian Bank.

Design/methodology/approach

Theoretical sources on “blockchain banking” were initially investigated. Then the “sub-processes” of “blockchain banking” as a “business process” were extracted by Parsian Bank's experts through the “Delphi method”. Next, the “sequence” of the “sub-processes” was determined by means of the “AHP”. Eventually, Parsian Bank's maturity levels for all the sub-processes as well as the overall maturity level were specified on the basis of the “CMMI” V1.3 in order for Business Process Management (BPM).

Findings

Blockchain banking’ combines traditional banking with cryptocurrencies, which can be provided by merging “hybrid e-wallet” with “bank account” and “bank card” – all together as “crypto bank account”. Plus, “hybrid e-wallet” is a form of mobile e-wallet on blockchain that supports both cryptocurrencies and traditional currencies in the same platform by which the purchase and sale of cryptocurrencies are possible. Besides, “Blockchain banking service” can also be offered within the framework of “open banking” aligned with “open innovation” through a FinTech (or a beta bank) in collaboration with a licensed bank via “open API”, which is called “blockchain banking based on FinTech”. At last, the eight sub-processes of “blockchain banking” were determined and Parsian Bank's “maturity level” was specified.

Originality/value

This is the very first practical guide to “blockchain banking service”.

Details

Asian Journal of Economics and Banking, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2615-9821

Keywords

Article
Publication date: 29 May 2024

Ali Noroozian

The purpose of this study is to offer a straightforward, cost-effective, and feasible resolution for managers to assess their processes in a live manner using the process mining…

Abstract

Purpose

The purpose of this study is to offer a straightforward, cost-effective, and feasible resolution for managers to assess their processes in a live manner using the process mining technique and to identify anomalies in cases that deviate from the standard. Consequently, the findings of this research can be utilized by organizational managers, while process mining vendors can also leverage it as a feature for their solutions.

Design/methodology/approach

Our two-step method is designed to initially evaluate the level of standardization within the process, followed by identifying its underlying cause. These two steps are aimed at helping managers effectively evaluate their business processes. The steps are: (1). Start-End Case Diagram: This diagram allows for the evaluation of the lead time trend and identification of cases that deviate from the standard trend line in a service-based process. (2). Happy Path Analysis: Pareto law is suggested to identify the most frequent process variants.

Findings

This approach enables organizations to easily identify problematic cases and investigate bottlenecks when deviations from the standards occur.

Originality/value

The novelty of the paper lies in the introduction and utilization of the start-end case diagram, as well as the combination of this diagram with the Pareto law for the identification of happy path and root cause analysis.

Details

Business Process Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-7154

Keywords

Open Access
Article
Publication date: 29 May 2024

Mohanad Rezeq, Tarik Aouam and Frederik Gailly

Authorities have set up numerous security checkpoints during times of armed conflict to control the flow of commercial and humanitarian trucks into and out of areas of conflict…

Abstract

Purpose

Authorities have set up numerous security checkpoints during times of armed conflict to control the flow of commercial and humanitarian trucks into and out of areas of conflict. These security checkpoints have become highly utilized because of the complex security procedures and increased truck traffic, which significantly slow the delivery of relief aid. This paper aims to improve the process at security checkpoints by redesigning the current process to reduce processing time and relieve congestion at checkpoint entrance gates.

Design/methodology/approach

A decision-support tool (clearing function distribution model [CFDM]) is used to minimize the effects of security checkpoint congestion on the entire humanitarian supply network using a hybrid simulation-optimization approach. By using a business process simulation, the current and reengineered processes are both simulated, and the simulation output was used to estimate the clearing function (capacity as a function of the workload). For both the AS-IS and TO-BE models, key performance indicators such as distribution costs, backordering and process cycle time were used to compare the results of the CFDM tool. For this, the Kerem Abu Salem security checkpoint south of Gaza was used as a case study.

Findings

The comparison results demonstrate that the CFDM tool performs better when the output of the TO-BE clearing function is used.

Originality/value

The efforts will contribute to improving the planning of any humanitarian network experiencing congestion at security checkpoints by minimizing the impact of congestion on the delivery lead time of relief aid to the final destination.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 19 April 2024

Danar Agus Susanto, Mokhamad Suef, Putu Dana Karningsih and Bambang Prasetya

This study’s main objective is to explore the ISO 9001 implementation model and identify a future research agenda. This is important because not all organizations find it easy to…

Abstract

Purpose

This study’s main objective is to explore the ISO 9001 implementation model and identify a future research agenda. This is important because not all organizations find it easy to implement ISO 9001, and not all organizations get positive benefits after implementing it.

Design/methodology/approach

The paper presents a comprehensive review of the literature on ISO 9001 implementation models using the preferred reporting items for systematic reviews (PRISMA) methodology to systematically review the existing literature on ISO 9001 implementation models. Relevant studies published from 2003 to early 2023 are explored to reveal the research landscape, gaps and trends.

Findings

Many ISO 9001 implementation methods have been developed for actual implementation in organizations, including models, frameworks, special variable considerations, application uses and integration. These methods were developed and applied to cover gaps regarding constraints, unbeneficial, special conditions, implementation objectives and organization types in ISO 9001 implementation. Current issues and future research on ISO 9001 implementation models were found, namely ISO 9001 implementation models specific to SMEs, ISO 9001 implementation levels, ISO 9001 implementation models that are agile to change, and affordable certification models.

Originality/value

Only a few researchers have systematically reviewed the literature or taken a bibliometric approach in their analyses to provide an overview of the current trends and links to ISO 9001 implementation models. The ISO 9001 standard is a general standard and can be applied by all organizations with the implementation method left to the implementer. Many implementation methods have been developed, but several implementation obstacles and disadvantages are still found. It is important to know the extent of current research and discover future research gaps regarding methods of implementing the ISO 9001 standard.

Details

The TQM Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-2731

Keywords

Article
Publication date: 26 June 2023

Chetna Choudhary, Deepti Mehrotra and Avinash K. Shrivastava

As the number of web applications is increasing day by day web mining acts as an important tool to extract useful information from weblogs and analyse them according to the…

Abstract

Purpose

As the number of web applications is increasing day by day web mining acts as an important tool to extract useful information from weblogs and analyse them according to the attributes and predict the usage of a website. The main aim of this paper is to inspect how process mining can be used to predict the web usability of hotel booking sites based on the number of users on each page, and the time of stay of each user. Through this paper, the authors analyse the web usability of a website through process mining by finding the web usability metrics. This work proposes an approach to finding the usage of a website using the attributes available in the weblog which predicts the actual footfall on a website.

Design/methodology/approach

PROM (Process Mining tool) is used for the analysis of the event log of a hotel booking site. In this work, authors have used a case study to apply the PROM (process mining tool) to pre-process the event log dataset for analysis to discover better-structured process maps than without pre-processing.

Findings

This article first provided an overview of process mining, then focused on web mining and later discussed process mining techniques. It also described different target languages: system nets (i.e. Petri nets with an initial and a final state), inductive miner and heuristic miner, graphs showing the change in behaviour of the dataset and predicting the outcome, that is the webpage having the maximum number of hits.

Originality/value

In this work, a case study has been used to apply the PROM (process mining tool) to pre-process the event log dataset for analysis to discover better-structured process maps than without pre-processing.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 24 May 2024

Daniele Giordino, Ciro Troise, Francesca Culasso and Laura Cutrì

The present article draws from the behavioral theory of the firm, and it explores whether various dimensions of organization slack can be employed as variables to measure…

Abstract

Purpose

The present article draws from the behavioral theory of the firm, and it explores whether various dimensions of organization slack can be employed as variables to measure organizations’ antifragility during times of uncertainty such as the Covid-19 pandemic. Furthermore, considering the limitations and regulations put into place during the most recent pandemic, the present study seeks to explore the moderating effect that collaborative networks might have on the relationship between various dimensions of organizational slack and firms performance.

Design/methodology/approach

The present study retrieves data from Thomson Reuters Data Stream, and it gathers observations from manufacturing companies located in Europe. The dataset is composed of observations spanning from the fiscal year 2019–2022. Consequently, through the use of a balanced panel data, the authors conduct multiple regression analysis.

Findings

The obtained empirical findings reveal that high discretion slack has a positive effect on companies performance whereas low discretion slack has a negative effect on their performance. Additionally, the obtained findings indicate that low levels of reliance on collaborative networks positively moderates the relationship between organizational slack and firms’ performance. On the other hand, high levels of reliance on collaborative networks negatively moderate the relationship between organizational slack and firms performance.

Originality/value

This manuscript carries several original contributions. It expands the literature stream concerning antifragility and collaborative networks. Additionally, it postulates an operational measure which can be used to indicate firms’ antifragility.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

1 – 10 of 39