{"title":"Think? Compute! See!! End User Programming for Thinkers","authors":"Dave A. Thomas","doi":"10.1109/EDOC.2015.15","DOIUrl":"https://doi.org/10.1109/EDOC.2015.15","url":null,"abstract":"Summary form only given. In this talk we discuss our experience making state of the art software technologies including vector functional programming, collaborative analytics and visualization consumable by demanding customers we call Thinkers. The emerging discipline of Computational Science brings Thinkers and Software Experts together to create environments for Thinkers. Thinkers are well educated domain and problem focused computationally literate end users. On a day by day basis thinkers live in Big Data to collaboratively solve their business and technical challenges. Thinkers reject being passive misunderstood requirements changing Agile customers. They have no use for end user tools for dummies. They question the cost and complexity of accepted software engineering and IT approaches. Lacking better alternatives they often resort to hodge-podge collections of scripts and arcane tools. Thinkers need a capability to Think-Compute-See and to actively participate in problem solutions.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"97 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133351258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Mukkamala, Janni Sorensen, Abid Hussain, Ravikiran Vatrapu
{"title":"Social Set Analysis of Corporate Social Media Crises on Facebook","authors":"R. Mukkamala, Janni Sorensen, Abid Hussain, Ravikiran Vatrapu","doi":"10.1109/EDOC.2015.25","DOIUrl":"https://doi.org/10.1109/EDOC.2015.25","url":null,"abstract":"Social media crises pose significant challenges for organizations in terms of their rapid propagation and deterioration of brand parameters and can have sustained negative business impacts. This paper reports a multiple case study of four different corporate social media crises. The multiple case study was informed by crisis communication and management theories and employed multiple methods consisting of the novel approach to big social data analytics-social set analysis, nenography, and manual sentiment analysis and topic discovery. Empirical findings show the voluminous but also transient nature of social media crises, reveal the different strategies employed by the organizations to manage the crises and their outcomes, and a diversity of aggregate user behavioural patterns. Based on the findings, we recommend that companies should choose a response strategy that is suitable for the type of crisis they are experiencing as well as the industry sector they belong to. In summary, this paper is the first demonstration of the suitability and effectiveness of Social Set Analysis for conceptualizing, formalizing and analyzing big social data from content-driven social media platforms like Facebook for event studies such as unexpected crises and/or coordinated marketing campaigns.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123798298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jyothi Kunchala, Jian Yu, Quan Z. Sheng, Yanbo Han, Sira Yongchareon
{"title":"Synthesis of Artifact Lifecycles from Activity-centric Process Models","authors":"Jyothi Kunchala, Jian Yu, Quan Z. Sheng, Yanbo Han, Sira Yongchareon","doi":"10.1109/EDOC.2015.14","DOIUrl":"https://doi.org/10.1109/EDOC.2015.14","url":null,"abstract":"In recent years, artifact-centric business process modeling is gaining momentum with its improved flexibility and extensibility. In order to support the rapid translation of the traditional activity-centric processes into this new type of processes, this paper proposes a novel approach to automatically transforming an activity-centric process model into a group of lifecycles of artifacts and their interactions, which represent the behavior of its corresponding artifact-centric process model. Algorithms on translating an activity-centric process model into a tree model, finding the dependencies between two object/artifact states based on the tree model, and synthesizing the lifecycles of artifacts have been proposed. Throughout the paper, we illustrate our approach with an order processing running scenario.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126330446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Exploration of Capability Research","authors":"M. Wißotzki","doi":"10.1109/EDOC.2015.33","DOIUrl":"https://doi.org/10.1109/EDOC.2015.33","url":null,"abstract":"Due to the global digitalization, fast shifting business models and short technology lifecycles, modern enterprises need a strategy how to deal with those unpredictable changes in order to stay competitive. The concept of capability driven management like capability-based-planning or investment gets more and more attention by executives and scientists. In the last decade IS and management journals as well as conferences were publishing an increasing number of capability related articles, but a common understanding corresponding the identification of capabilities, their management, types or elements seems to be not existing. This work encapsulates the body of capability literature to provide an overview about capability research investigations over the last 15 years.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"67 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132792835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Maté, J. Trujillo, Elvis Koci, Konstantinos Zoumpatianos, J. Mylopoulos
{"title":"Monitoring Strategic Business Goals with Argus","authors":"A. Maté, J. Trujillo, Elvis Koci, Konstantinos Zoumpatianos, J. Mylopoulos","doi":"10.1109/EDOC.2015.11","DOIUrl":"https://doi.org/10.1109/EDOC.2015.11","url":null,"abstract":"Business analytics has emerged in the past decade as a top concern for business executives world-wide, surpassing earlier top concerns such as supply chain management and total quality management. Business analysis techniques analyze operational data for a variety of purposes including prediction, planning, monitoring, and trouble-shooting. In this paper we focus on one type of analysis, monitoring operational data to determine whether a business is on track relative to its strategic goals. If deviations exists, our approach narrows the search to the most problematic instances detected. Furthermore, we show how the process can be fully automated including the generation of all necessary queries. Finally, we show how the monitoring process has been implemented in our tool, Argus, which enables the analysis of arbitrary periods of time. Our prototype has been evaluated using a small data warehouse of synthetic data.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131651442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multidimensional Cluster Sampling View on Large Databases for Approximate Query Processing","authors":"Tomohiro Inoue, A. Krishna, R. Gopalan","doi":"10.1109/EDOC.2015.24","DOIUrl":"https://doi.org/10.1109/EDOC.2015.24","url":null,"abstract":"Approximate query processing with relatively small random samples is an effective way to deal with many queries on large databases. However, small random samples might miss relevant records for highly selective queries due to insufficient coverage. A multidimensional index tree called the k-MDI was proposed as an effective sampling scheme for highly selective decision support queries. It has been shown to support a fast response time and high accuracy, whereas implementation of the k-MDI on database tables was not discussed. This paper proposes the Multidimensional Cluster Sampling View based on the k-MDI. The view can be implemented with ease using common database tables and can be manipulated by SQL statements. Furthermore, it is able to provide trustable approximate answers quickly for any query condition. The response time and accuracy of approximation are validated on a large dataset based on TPC-DS specifications.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Maamar, V. Burégio, Noura Faci, D. Benslimane, Quan Z. Sheng
{"title":"\"Controlling\" Web 2.0 Applications in the Workplace","authors":"Z. Maamar, V. Burégio, Noura Faci, D. Benslimane, Quan Z. Sheng","doi":"10.1109/EDOC.2015.35","DOIUrl":"https://doi.org/10.1109/EDOC.2015.35","url":null,"abstract":"Over the years, different development waves have shaped the Web. Introduced as a tool to browse Web sites, the Web now is a dynamic and robust platform upon which enterprises conduct e-Business. One of these waves known as Web 2.0 (or social Web) is putting pressure on how enterprises should ensure a productive use of Web 2.0 applications such as Facebook and Twitter. Misuse cases of these applications are on the rise and the lack of guidelines and awareness is a main reason. This paper presents an approach for \"controlling\" the social actions that Web 2.0 applications allow users to execute. These actions are identified after analyzing some representative Web 2.0 applications and then defined in terms of stakeholders, content, and tools. The control over these actions is defined with UML Object Constraint Language (OCL) and then demonstrated through a prototype system.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Prediction Framework for Proactively Monitoring Aggregate Process-Performance Indicators","authors":"Francesco Folino, M. Guarascio, L. Pontieri","doi":"10.1109/EDOC.2015.27","DOIUrl":"https://doi.org/10.1109/EDOC.2015.27","url":null,"abstract":"Monitoring the performances of a business process is a key issue in many organizations, especially when predefined constraints exist on them, due to contracts or internal requirements. Several approaches were defined recently in the literature for predicting the performances of a single process instance. However, in many real situations, process-oriented performance metrics and associated constraints are defined in an aggregated form, on a time-window basis. This work right addresses the problem of predicting whether (the process instances in) each time window will infringe an aggregate performance constraint, at a series of checkpoints within the window. To this end, at each checkpoint, three kinds of measures are to be estimated: what performance outcome each ongoing process instance will yield, how many process instances will start in the rest of the window, and what their aggregate performance outcomes will be. The approach proposed is general (it can reuse a wide range of regression methods), and it can be embedded in a continuous monitoring-and-learning scheme. Tests on real-life logs showed its validity in terms of prediction accuracy.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuzong Chen, Gareth Sime, C. Lutteroth, Gerald Weber
{"title":"OAuthHub - A Service for Consolidating Authentication Services","authors":"Xuzong Chen, Gareth Sime, C. Lutteroth, Gerald Weber","doi":"10.1109/EDOC.2015.36","DOIUrl":"https://doi.org/10.1109/EDOC.2015.36","url":null,"abstract":"OAuth has become a widespread authorization protocol to allow inter-enterprise sharing of user preferences and data: a Consumer that wants access to a user's protected resources held by a Service Provider can use OAuth to ask for the user's authorization for access to these resources. However, it can be tedious for a Consumer to use OAuth as a way to organize user identities, since doing so requires supporting all Service Providers that the Consumer would recognize as users' \"identity providers\". Each Service Provider added requires extra work, at the very least, registration at that Service Provider. Different Service Providers may differ slightly in the API they offer, their authentication/authorization process or even their supported version of OAuth. The use of different OAuth Service Providers also creates privacy, security and integration problems. Therefore OAuth is an ideal candidate for Software as a Service, while posing interesting challenges at the same time. We use conceptual modelling to derive new high-level models and provide an analysis of the solution space. We address the aforementioned problems by introducing a trusted intermediary - OAuth Hub - into this relationship and contrast it with a variant, OAuth Proxy. Instead of having to support and control different OAuth providers, Consumers can use OAuth Hub as a single trusted intermediary to take care of managing and controlling how authentication is done and what data is shared. OAuth Hub eases development and integration issues by providing a consolidated API for a range of services. We describe how a trusted intermediary such as OAuth Hub can fit into the overall OAuth architecture and discuss how it can satisfy demands on security, reliability and usability.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127717383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ERP Systems' Usage in the German IT Service Industry: An Exploratory Multi-case Study","authors":"Johannes Hintsch, Frederik Kramer, K. Turowski","doi":"10.1109/EDOC.2015.32","DOIUrl":"https://doi.org/10.1109/EDOC.2015.32","url":null,"abstract":"In order to achieve efficiency and effectiveness gains, concepts such as standardization and automation originating in the manufacturing industry are adopted by IT service providers. ERP systems are tools to implement such concepts in manufacturing companies. This research examines if and how ERP systems are used by IT service providers. To answer this question, an interview-based exploratory multiple-case study is conducted because only very limited findings on the topic exist. Representatives of 24 IT service providers and ERP vendors were interviewed. We found that ERP systems are used by the studied companies: 21 out of 24 use ERP systems. Seven selected companies are presented in greater detail: one that doesn't use an ERP system and six that do. We describe which functional areas are covered by their ERP systems and which ones are covered by other application systems. For instance, all of the six companies use the material management module of their ERP system, but four out of five cases used a non-ERP standard application system for ticketing. Finally, we found no case that used traditional production and planning capabilities of ERP systems as suggested by previous design science work.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}