Search results
1 – 10 of 39Mariam Ben Hassen, Mohamed Turki and Faiez Gargouri
This paper introduces the problematic of the SBP modeling. Our objective is to provide a conceptual analysis related to the concept of SBP. This facilitates, on the one hand…
Abstract
Purpose
This paper introduces the problematic of the SBP modeling. Our objective is to provide a conceptual analysis related to the concept of SBP. This facilitates, on the one hand, easier understanding by business analysts and end-users, and one the other hand, the integration of the new specific concepts relating to the SBP/BPM-KM domains into the BPMN meta-model (OMG, 2013).
Design/methodology/approach
We propose a rigorous characterization of SBP (Sensitive Business Processes) (which distinguishes it from classic, structured and conventional BPs). Secondly, we propose a multidimensional classification of SBP modeling aspects and requirements to develop expressive, comprehensive and rigorous models. Besides, we present an in-depth study of the different modeling approaches and languages, in order to analyze their expressiveness and their abil-ity to perfectly and explicitly represent the new specific requirements of SBP modeling. In this study, we choose the better one positioned nowadays, BPMN 2.0, as the best suited standard for SBP representation. Finally, we propose a semantically rich conceptualization of a SBP organized in core ontology.
Findings
We defined a rigorous conceptual specification for this type of BP, organized in a multi-perspective formal ontology, the Core Ontology of Sensitive Business Processes (COSBP). This reference ontology will be used to define a generic BP meta-model (BPM4KI) further specifying SBPs. The objective is to obtain an enriched consensus modeling covering all generic concepts, semantic relationships and properties needed for the exploitation of SBPs, known as core modeling.
Originality/value
This paper introduces the problem of conceptual analysis of SBPs for (crucial) knowledge identification and management. These processes are highly complex and knowledge-intensive. The originality of this contribution lies in the multi-dimensional approach we have adopted for SBP modeling as well as the definition of a Core Ontology of Sensitive Business Processes (COSBP) which is very useful to extend the BPMN notation for knowledge management.
Details
Keywords
Jayme Stewart, Jessie Swanek and Adelle Forth
Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying…
Abstract
Purpose
Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying that perpetrators target them repeatedly. Indeed, research reveals specific traits (e.g. submissiveness) and behaviors (e.g. gait) related to past victimization or vulnerability. The purpose of this study is to explore the link between personality traits, self-assessed vulnerability and nonverbal cues.
Design/methodology/approach
In all, 40 undergraduate Canadian women were videotaped while recording a dating profile. Self-report measures of assertiveness, personality traits and vulnerability ratings for future sexual or violent victimization were obtained following the video-recording. The videotape was coded for nonverbal behaviors that have been related to assertiveness or submissiveness.
Findings
Self-perceived sexual vulnerability correlated with reduced assertiveness and dominance and increased emotionality (e.g. fear and anxiety). Additionally, nonverbal behaviors differed based on personality traits: self-touch was linked to lower assertiveness, dominance and extraversion and higher submissiveness, emotionality and warm-agreeableness.
Originality/value
To the best of the authors’ knowledge, this is the first study of its kind to consider the relationships between personality, self-perceived vulnerability and nonverbal behaviors among college-aged women. Potential implications, including enhancing autonomy and self-efficacy, are discussed.
Details
Keywords
Tatiane Neves Lopes, Renata Mendes de Araujo, Tadeu Moreira de Classe and Flávio dos Santos Sant'Anna
Business process training is a crucial activity in the business process management lifecycle, performed whenever an organization needs to train workers about how to carry out…
Abstract
Purpose
Business process training is a crucial activity in the business process management lifecycle, performed whenever an organization needs to train workers about how to carry out their activities according to defined processes, after significant process changes, or whenever new workers come on board. Due to their motivational character, serious games have been understood as an unconventional alternative to support training in organizational processes. Still, methodologies to design serious digital games specifically for business process training are missing in the literature. This research paper presents a method – Play Your Process for Training (PYP4Training) – for designing digital games for business process training.
Design/methodology/approach
The research is guided by design science research methodologies and comprises the adaptation of Play Your Process (PYP), a method for designing business process-based digital games (BPBDG). PYP activities and supporting tools were shaped to cope with the specific requirements of BPBDG design for process training purposes, bringing to light a new method: PYP4Training.
Findings
PYP4Training was evaluated by designing a BPBDG for training a heavy equipment maintenance process in a multinational mining company. The game was evaluated by process owners and actors who reported a positive perception of the game as an option for process training. However, there is still space for improving trainees' engagement.
Originality/value
The research proposes an innovative way for business process training using digital games. Nevertheless, literature shows a lack of systematic procedures to build such games and results about their use.
Details
Keywords
Aamir Rashid, Rizwana Rasheed and Noor Aina Amirah
Supply chain collaboration (SCC) benefits organizational performance (OP). Although it is complex, it is also hard to implement and measure collaborative initiatives in the field…
Abstract
Purpose
Supply chain collaboration (SCC) benefits organizational performance (OP). Although it is complex, it is also hard to implement and measure collaborative initiatives in the field of the supply chain. This study aims to examine the role of information technology (IT) and people’s involvement in OP through the mediation of supply chain collaboration.
Design/methodology/approach
This study used a deductive and quantitative approach to test the research hypotheses. Data was collected from 249 supply chain professionals working at various manufacturing firms.
Findings
This research found a significant effect of IT on supply chain collaboration. Similarly, people involvement (PI) also significantly influenced the supply chain collaboration. For the mediation hypotheses, SCC significantly mediates the relationships between two independent variables (IT and PI) and OP. Furthermore, the full mediation of SCC occurred.
Originality/value
This study provides a framework emphasizing manufacturing firms’ practices, SCC and OP. The “people involvement” was found as a novel variable in the tested model using the resource-based view as a supporting theory. The research findings can benefit the professionals working on supply chain business processes to improve OP.
Details
Keywords
Komeil Ali Taghavi and Mohammadreza Mashayekh
The description of “blockchain banking”, the determination of “the sub-processes” of “blockchain banking” as a “business process”, and the assessment of “maturity level” in…
Abstract
Purpose
The description of “blockchain banking”, the determination of “the sub-processes” of “blockchain banking” as a “business process”, and the assessment of “maturity level” in Parsian Bank.
Design/methodology/approach
Theoretical sources on “blockchain banking” were initially investigated. Then the “sub-processes” of “blockchain banking” as a “business process” were extracted by Parsian Bank's experts through the “Delphi method”. Next, the “sequence” of the “sub-processes” was determined by means of the “AHP”. Eventually, Parsian Bank's maturity levels for all the sub-processes as well as the overall maturity level were specified on the basis of the “CMMI” V1.3 in order for Business Process Management (BPM).
Findings
Blockchain banking’ combines traditional banking with cryptocurrencies, which can be provided by merging “hybrid e-wallet” with “bank account” and “bank card” – all together as “crypto bank account”. Plus, “hybrid e-wallet” is a form of mobile e-wallet on blockchain that supports both cryptocurrencies and traditional currencies in the same platform by which the purchase and sale of cryptocurrencies are possible. Besides, “Blockchain banking service” can also be offered within the framework of “open banking” aligned with “open innovation” through a FinTech (or a beta bank) in collaboration with a licensed bank via “open API”, which is called “blockchain banking based on FinTech”. At last, the eight sub-processes of “blockchain banking” were determined and Parsian Bank's “maturity level” was specified.
Originality/value
This is the very first practical guide to “blockchain banking service”.
Details
Keywords
The purpose of this study is to offer a straightforward, cost-effective, and feasible resolution for managers to assess their processes in a live manner using the process mining…
Abstract
Purpose
The purpose of this study is to offer a straightforward, cost-effective, and feasible resolution for managers to assess their processes in a live manner using the process mining technique and to identify anomalies in cases that deviate from the standard. Consequently, the findings of this research can be utilized by organizational managers, while process mining vendors can also leverage it as a feature for their solutions.
Design/methodology/approach
Our two-step method is designed to initially evaluate the level of standardization within the process, followed by identifying its underlying cause. These two steps are aimed at helping managers effectively evaluate their business processes. The steps are: (1). Start-End Case Diagram: This diagram allows for the evaluation of the lead time trend and identification of cases that deviate from the standard trend line in a service-based process. (2). Happy Path Analysis: Pareto law is suggested to identify the most frequent process variants.
Findings
This approach enables organizations to easily identify problematic cases and investigate bottlenecks when deviations from the standards occur.
Originality/value
The novelty of the paper lies in the introduction and utilization of the start-end case diagram, as well as the combination of this diagram with the Pareto law for the identification of happy path and root cause analysis.
Details
Keywords
Mohanad Rezeq, Tarik Aouam and Frederik Gailly
Authorities have set up numerous security checkpoints during times of armed conflict to control the flow of commercial and humanitarian trucks into and out of areas of conflict…
Abstract
Purpose
Authorities have set up numerous security checkpoints during times of armed conflict to control the flow of commercial and humanitarian trucks into and out of areas of conflict. These security checkpoints have become highly utilized because of the complex security procedures and increased truck traffic, which significantly slow the delivery of relief aid. This paper aims to improve the process at security checkpoints by redesigning the current process to reduce processing time and relieve congestion at checkpoint entrance gates.
Design/methodology/approach
A decision-support tool (clearing function distribution model [CFDM]) is used to minimize the effects of security checkpoint congestion on the entire humanitarian supply network using a hybrid simulation-optimization approach. By using a business process simulation, the current and reengineered processes are both simulated, and the simulation output was used to estimate the clearing function (capacity as a function of the workload). For both the AS-IS and TO-BE models, key performance indicators such as distribution costs, backordering and process cycle time were used to compare the results of the CFDM tool. For this, the Kerem Abu Salem security checkpoint south of Gaza was used as a case study.
Findings
The comparison results demonstrate that the CFDM tool performs better when the output of the TO-BE clearing function is used.
Originality/value
The efforts will contribute to improving the planning of any humanitarian network experiencing congestion at security checkpoints by minimizing the impact of congestion on the delivery lead time of relief aid to the final destination.
Details
Keywords
Danar Agus Susanto, Mokhamad Suef, Putu Dana Karningsih and Bambang Prasetya
This study’s main objective is to explore the ISO 9001 implementation model and identify a future research agenda. This is important because not all organizations find it easy to…
Abstract
Purpose
This study’s main objective is to explore the ISO 9001 implementation model and identify a future research agenda. This is important because not all organizations find it easy to implement ISO 9001, and not all organizations get positive benefits after implementing it.
Design/methodology/approach
The paper presents a comprehensive review of the literature on ISO 9001 implementation models using the preferred reporting items for systematic reviews (PRISMA) methodology to systematically review the existing literature on ISO 9001 implementation models. Relevant studies published from 2003 to early 2023 are explored to reveal the research landscape, gaps and trends.
Findings
Many ISO 9001 implementation methods have been developed for actual implementation in organizations, including models, frameworks, special variable considerations, application uses and integration. These methods were developed and applied to cover gaps regarding constraints, unbeneficial, special conditions, implementation objectives and organization types in ISO 9001 implementation. Current issues and future research on ISO 9001 implementation models were found, namely ISO 9001 implementation models specific to SMEs, ISO 9001 implementation levels, ISO 9001 implementation models that are agile to change, and affordable certification models.
Originality/value
Only a few researchers have systematically reviewed the literature or taken a bibliometric approach in their analyses to provide an overview of the current trends and links to ISO 9001 implementation models. The ISO 9001 standard is a general standard and can be applied by all organizations with the implementation method left to the implementer. Many implementation methods have been developed, but several implementation obstacles and disadvantages are still found. It is important to know the extent of current research and discover future research gaps regarding methods of implementing the ISO 9001 standard.
Details
Keywords
Chetna Choudhary, Deepti Mehrotra and Avinash K. Shrivastava
As the number of web applications is increasing day by day web mining acts as an important tool to extract useful information from weblogs and analyse them according to the…
Abstract
Purpose
As the number of web applications is increasing day by day web mining acts as an important tool to extract useful information from weblogs and analyse them according to the attributes and predict the usage of a website. The main aim of this paper is to inspect how process mining can be used to predict the web usability of hotel booking sites based on the number of users on each page, and the time of stay of each user. Through this paper, the authors analyse the web usability of a website through process mining by finding the web usability metrics. This work proposes an approach to finding the usage of a website using the attributes available in the weblog which predicts the actual footfall on a website.
Design/methodology/approach
PROM (Process Mining tool) is used for the analysis of the event log of a hotel booking site. In this work, authors have used a case study to apply the PROM (process mining tool) to pre-process the event log dataset for analysis to discover better-structured process maps than without pre-processing.
Findings
This article first provided an overview of process mining, then focused on web mining and later discussed process mining techniques. It also described different target languages: system nets (i.e. Petri nets with an initial and a final state), inductive miner and heuristic miner, graphs showing the change in behaviour of the dataset and predicting the outcome, that is the webpage having the maximum number of hits.
Originality/value
In this work, a case study has been used to apply the PROM (process mining tool) to pre-process the event log dataset for analysis to discover better-structured process maps than without pre-processing.
Details
Keywords
Daniele Giordino, Ciro Troise, Francesca Culasso and Laura Cutrì
The present article draws from the behavioral theory of the firm, and it explores whether various dimensions of organization slack can be employed as variables to measure…
Abstract
Purpose
The present article draws from the behavioral theory of the firm, and it explores whether various dimensions of organization slack can be employed as variables to measure organizations’ antifragility during times of uncertainty such as the Covid-19 pandemic. Furthermore, considering the limitations and regulations put into place during the most recent pandemic, the present study seeks to explore the moderating effect that collaborative networks might have on the relationship between various dimensions of organizational slack and firms performance.
Design/methodology/approach
The present study retrieves data from Thomson Reuters Data Stream, and it gathers observations from manufacturing companies located in Europe. The dataset is composed of observations spanning from the fiscal year 2019–2022. Consequently, through the use of a balanced panel data, the authors conduct multiple regression analysis.
Findings
The obtained empirical findings reveal that high discretion slack has a positive effect on companies performance whereas low discretion slack has a negative effect on their performance. Additionally, the obtained findings indicate that low levels of reliance on collaborative networks positively moderates the relationship between organizational slack and firms’ performance. On the other hand, high levels of reliance on collaborative networks negatively moderate the relationship between organizational slack and firms performance.
Originality/value
This manuscript carries several original contributions. It expands the literature stream concerning antifragility and collaborative networks. Additionally, it postulates an operational measure which can be used to indicate firms’ antifragility.
Details