2008 IEEE International Conference on E-Business Engineering 2008
DOI: 10.1109/icebe.2008.123
|View full text |Cite
|
Sign up to set email alerts
|

Business Process and Risk Models Enrichment: Considerations for Business Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Gantt chart will show the relations of activities. Next, a process model is created based on the Gantt chart for all cases in Petri Net [3][20] [22]. We need to create the transition, input, output and place for all the process model [23].…”
Section: Integrated Discovery Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Gantt chart will show the relations of activities. Next, a process model is created based on the Gantt chart for all cases in Petri Net [3][20] [22]. We need to create the transition, input, output and place for all the process model [23].…”
Section: Integrated Discovery Approachmentioning
confidence: 99%
“…Nowadays, enterprise computing manages business processes which has grown up rapidly [1][2] [3]. This situation triggers the production of a massive event log that gives knowledge about the activities of business processes run recently or few years ago [4] [5].…”
Section: Introductionmentioning
confidence: 99%
“…To aid our evaluation, Table 2 is provided to summarize the types of riskrelated activities that each of the twenty-seven approaches supports at each stage of the BPM lifecycle. Jakoubi, and Quirchmayr, 2008b;Tjoa, Jakoubi, Goluch, and Kitzler, 2010;Tjoa, Jakoubi, Goluch, and Quirchmayr, 2008a;Tjoa et al, 2011;Jakoubi, Tjoa, and Quirchmayr, 2007;Kitzler, 2010a, 2010b;Jakoubi, Neubauer, and Tjoa, 2009b;Ekelhart, Fenz, Klemen, and Weippl, 2007;Jakoubi and Tjoa, 2009;Jakoubi, Goluch, Tjoa, and Quirchmayr, 2008;Goluch et al, 2008 Sienou et al DI02 Sienou, Lamine, Pingaud, and Karduck, 2010;Sienou, Lamine, Karduck, and Pingaud, 2008b;Sienou, Lamine, Karduck and Pingaud, 2007;Sienou, Lamine, Pingaud, and Karduck, 2009;Sienou, Lamine, and Pingaud, 2008c;Sienou, Karduck, and Pingaud, 2006;Sienou, Karduck, Lamine, and Pingaud, 2008a;Karduck, Sienou, Lamine, and Pingaud, 2007;Sienou, 2009 Rotaru et al DI08 Rotaru, Wilkin, Churilov, and Neiger, 2008;Neiger, Churliov, zur Muehlen, and Rosemann, 2006;Rotaru, Wilkin, Churilov, Neiger, and Ceglowski, 2009 Betz et al DI09 Betz, Hickl, and Oberweis, 2011 Herrmann and Herrmann…”
Section: Literature Evaluationmentioning
confidence: 99%
“…An organization has information systems which are used to collect, store and process data to gain information on certain things [1,2]. They can also support management and decision making of business processes [3]. Systems in the organization will generate event log which gives knowledge about the activities of business processes run recently or few years ago [4,5].…”
Section: Introductionmentioning
confidence: 99%