2022 IEEE 24th Conference on Business Informatics (CBI)最新文献

筛选
英文 中文
Towards a Reference Enterprise Architecture to enforce Digital Sovereignty in International Data Spaces 迈向在国际数据空间中实施数字主权的参考企业架构
2022 IEEE 24th Conference on Business Informatics (CBI) Pub Date : 2022-06-01 DOI: 10.1109/CBI54897.2022.00020
D. Firdausy, Patrício de Alencar Silva, M. V. Sinderen, M. Iacob
{"title":"Towards a Reference Enterprise Architecture to enforce Digital Sovereignty in International Data Spaces","authors":"D. Firdausy, Patrício de Alencar Silva, M. V. Sinderen, M. Iacob","doi":"10.1109/CBI54897.2022.00020","DOIUrl":"https://doi.org/10.1109/CBI54897.2022.00020","url":null,"abstract":"An International Data Space (IDS) aims to facilitate sovereign data sharing in business ecosystems. The GAIA-X project and the International Data Spaces Association (IDSA) lead initial European efforts to create such information systems. These institutions' high-level business rules and architectural guidelines are essential to attract companies interested in joining the IDS vision. However, companies may interpret these guidelines differently and derive implementations that have interoperability issues. This paper addresses this issue by reconciling data sovereignty and Enterprise Interoperability requirements into a Reference Enterprise Architecture for IDS. It aims to help companies create instantiations or specializations of organizational and software components to meet specific business cases' needs whil e preserving essential IDS principles. Representatives of two Enterprise Integration software companies interested in exploring the IDS vision helped refine the architecture through Technical-Action Research. An expert panel of representatives from the Dutch Logistics sector evaluated the architecture regarding its potential acceptance by small and medium enterprises (SMEs).","PeriodicalId":447040,"journal":{"name":"2022 IEEE 24th Conference on Business Informatics (CBI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114988051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Community Embeddings with Bayesian Gaussian Mixture Model and Variational Inference 基于贝叶斯高斯混合模型和变分推理的社区嵌入
2022 IEEE 24th Conference on Business Informatics (CBI) Pub Date : 2022-06-01 DOI: 10.1109/CBI54897.2022.10053
Anton Begehr, Peter B. Panfilov
{"title":"Community Embeddings with Bayesian Gaussian Mixture Model and Variational Inference","authors":"Anton Begehr, Peter B. Panfilov","doi":"10.1109/CBI54897.2022.10053","DOIUrl":"https://doi.org/10.1109/CBI54897.2022.10053","url":null,"abstract":"Graphs, such as social networks, emerge naturally from various real-world situations. Recently, graph embedding methods have gained traction in data science research. The graph and community embedding algorithm ComE aims to preserve first-, second- and higher-order proximity. ComE requires prior knowledge of the number of communities K. In this paper, ComE is extended to utilize a Bayesian Gaussian mixture model with variational inference for learning community embeddings (ComE BGMM+VI), similar to ComE+. ComE BGMM+VI takes K as the maximum number of communities and drops components through the trade-off hyperparameter weight concentration prior. The advantage of ComE BGMM+VI over the non-Bayesian ComE for an unknown number of communities K is shown for the small Karate club dataset and explored for the larger DBLP dataset.","PeriodicalId":447040,"journal":{"name":"2022 IEEE 24th Conference on Business Informatics (CBI)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114655633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IT Project Portfolio Assessment criteria: development and validation of a reference model IT项目组合评估标准:开发和验证参考模型
2022 IEEE 24th Conference on Business Informatics (CBI) Pub Date : 2022-06-01 DOI: 10.1109/CBI54897.2022.00022
Ruud Wissenburg, R. Kusters, H. Martin, Joyce Evers-Wagemakers
{"title":"IT Project Portfolio Assessment criteria: development and validation of a reference model","authors":"Ruud Wissenburg, R. Kusters, H. Martin, Joyce Evers-Wagemakers","doi":"10.1109/CBI54897.2022.00022","DOIUrl":"https://doi.org/10.1109/CBI54897.2022.00022","url":null,"abstract":"To get value from an IT project portfolio now and in the future, it is important to periodically assess the so-called health of the portfolio. If organizations attempt to assess the health of their portfolio, many do not use a proven set of assessment criteria. Moreover, recent literature lacks an overview of assessment criteria that have been validated in real life conditions. Therefore, this article attempts to provide a validated reference set of assessment criteria. In this study, first an initial list of potential assessment criteria was established based on literature. Secondly, the usefulness of these potential assessment criteria were validated in five case organizations. In this multiple case study, interviews were conducted with practitioners in the field of IT Project Portfolio Management to learn about their practical experience with the assessment criteria. During the in-depth interviews, experts were asked to assess the usefulness of the assessment criteria for monitoring the health of their IT Project Portfolio. We propose that this reference set can be used by organizations to assess the health of their IT Project Portfolio in a more confident manner.","PeriodicalId":447040,"journal":{"name":"2022 IEEE 24th Conference on Business Informatics (CBI)","volume":"91 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120835517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Discovering Instance Spanning Exceptions from Process Execution Logs 从进程执行日志中发现实例跨越异常
2022 IEEE 24th Conference on Business Informatics (CBI) Pub Date : 2022-06-01 DOI: 10.1109/CBI54897.2022.10048
Florian Stertz, Karolin Winter, S. Rinderle-Ma
{"title":"Discovering Instance Spanning Exceptions from Process Execution Logs","authors":"Florian Stertz, Karolin Winter, S. Rinderle-Ma","doi":"10.1109/CBI54897.2022.10048","DOIUrl":"https://doi.org/10.1109/CBI54897.2022.10048","url":null,"abstract":"Exceptions in process execution occur frequently and require appropriate handling strategies in order to avoid undesired consequences. For quality control in manufacturing processes, for example, when a blade gets missing, the set of affected instances is put on hold until the blade is found. As it can be seen from this example, the exception affects multiple instances and is hence denoted as instance spanning exception. Exceptions leave footprints in the process execution logs of the affected instances. Hence, process execution logs provide a valuable data source for discovering and analyzing exceptions. However, the discovery of instance spanning exceptions is still an open challenge. Thus, this paper proposes i) a classification of instance spanning exceptions based on literature and a set of real-world examples, followed by ii) a description of how instance spanning exceptions manifest in process execution logs along with an elicitation of minimal requirements for enabling their discovery, and iii) five instance spanning exception discovery algorithms, one for each class. The discovery algorithms are implemented and evaluated on a set of synthetic process execution logs reflecting real-world instance spanning exceptions and on a real-world process execution log from the public transport domain demonstrating the feasibility as well as applicability of the presented algorithms.","PeriodicalId":447040,"journal":{"name":"2022 IEEE 24th Conference on Business Informatics (CBI)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128064598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
No Time like the Present: Effects of Language Change on Automated Comment Moderation 没有时间像现在:语言变化对自动评论审核的影响
2022 IEEE 24th Conference on Business Informatics (CBI) Pub Date : 2022-06-01 DOI: 10.1109/CBI54897.2022.00012
Lennart Justen, K. Müller, Marco Niemann, J. Becker
{"title":"No Time like the Present: Effects of Language Change on Automated Comment Moderation","authors":"Lennart Justen, K. Müller, Marco Niemann, J. Becker","doi":"10.1109/CBI54897.2022.00012","DOIUrl":"https://doi.org/10.1109/CBI54897.2022.00012","url":null,"abstract":"The spread of online hate has become a significant problem for newspapers that host comment sections. As a result, there is growing interest in using machine learning (ML) and natural language processing (NLP) for (semi-) automated abusive language detection to avoid manual comment moderation costs or having to shut down comment sections altogether. However, much of the past work on abusive language detection assumes that classifiers operate in a static language environment, despite language and news being in a state of constant flux. In this paper, we show using a new German newspaper comments dataset that the classifiers trained with naive ML techniques like a random test-train split will underperform on future data, and that a time-stratified evaluation split is more appropriate. We also show that a classifier's performance rapidly degrades when evaluated on data from a different period than the training data. Our findings suggest that it is necessary to consider the temporal dynamics of language when developing an abusive language detection system or risk deploying a model that will quickly become defunct.","PeriodicalId":447040,"journal":{"name":"2022 IEEE 24th Conference on Business Informatics (CBI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125580660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Drivers and Inhibitors of Low Code Development Platform Adoption 低代码开发平台采用的驱动因素和抑制因素
2022 IEEE 24th Conference on Business Informatics (CBI) Pub Date : 2022-06-01 DOI: 10.1109/CBI54897.2022.00028
Sebastian Käss, Susanne Strahringer, M. Westner
{"title":"Drivers and Inhibitors of Low Code Development Platform Adoption","authors":"Sebastian Käss, Susanne Strahringer, M. Westner","doi":"10.1109/CBI54897.2022.00028","DOIUrl":"https://doi.org/10.1109/CBI54897.2022.00028","url":null,"abstract":"When done right, the use of low code development promises a significant competitive advantage in the software development process for organizations. Thus, multiple vendors have created low code development platforms to ease the use of low code development. However, current research on low code development platforms mainly focuses on the technological aspects of the platforms but not on their adoption. Hence, it remains unclear what drives and inhibits the adoption of low code development platforms. We conducted a literature review and identified thirteen factors that inhibit the adoption and seven factors that drive it. We structure these factors along with the diffusion of innovation framework that helps to disentangle drivers and inhibitors. As a result, we provide an initial explanation of the adoption of low code development platforms. Nevertheless, we conclude that existing research on the adoption of low code development platforms is not specific enough to understand the phenomenon substantially. Further, for some factors (e.g., cost), there is a disagreement in the academic literature on whether they are drivers or inhibitors. Hence, we identify gaps and derive avenues for future research.","PeriodicalId":447040,"journal":{"name":"2022 IEEE 24th Conference on Business Informatics (CBI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117085636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient Verification of Process Models Supporting Modifications of Data Values 支持数据值修改的过程模型的有效验证
2022 IEEE 24th Conference on Business Informatics (CBI) Pub Date : 2022-06-01 DOI: 10.1109/CBI54897.2022.00010
Elaheh Ordoni, J. Mülle, Kuan Yang, Klemens Böhm
{"title":"Efficient Verification of Process Models Supporting Modifications of Data Values","authors":"Elaheh Ordoni, J. Mülle, Kuan Yang, Klemens Böhm","doi":"10.1109/CBI54897.2022.00010","DOIUrl":"https://doi.org/10.1109/CBI54897.2022.00010","url":null,"abstract":"Verification techniques detect undesirable behaviour of process models before their execution. In many use cases, data-value functions are essential. A data-value function modifies the values of data objects in a process model, e.g., increases the price of a product. Supporting such functions when verifying process models is challenging. This is because data objects with large domains often lead to state-space explosion. In this paper, to address this issue, we propose a novel approach using a binary encoding technique. We make use of Binary Decision Diagrams (BDD) to map the semantics of data-value functions into a Petri Net. This allows using the existing BDD reduction techniques to reduce the number of edges and nodes in BDDs and, ultimately, of places and transitions in Petri Nets. One can now map process models with data-value functions into much smaller Petri Nets, whose verification is feasible. We show that this is indeed the case, by verifying properties of an important real-world application, the German 4G spectrum auction.","PeriodicalId":447040,"journal":{"name":"2022 IEEE 24th Conference on Business Informatics (CBI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114197952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Workshop Chairs: CBI 2022 来自研讨会主席的信息:CBI 2022
2022 IEEE 24th Conference on Business Informatics (CBI) Pub Date : 2022-06-01 DOI: 10.1109/cbi54897.2022.10039
{"title":"Message from the Workshop Chairs: CBI 2022","authors":"","doi":"10.1109/cbi54897.2022.10039","DOIUrl":"https://doi.org/10.1109/cbi54897.2022.10039","url":null,"abstract":"","PeriodicalId":447040,"journal":{"name":"2022 IEEE 24th Conference on Business Informatics (CBI)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116233497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retail sales forecasting for a Brazilian supermarket chain: an empirical assessment 巴西一家连锁超市的零售额预测:实证评估
2022 IEEE 24th Conference on Business Informatics (CBI) Pub Date : 2022-06-01 DOI: 10.1109/CBI54897.2022.00014
Fernanda Monteiro de Almeida, A. Martins, Marcus A. Nunes, L. Bezerra
{"title":"Retail sales forecasting for a Brazilian supermarket chain: an empirical assessment","authors":"Fernanda Monteiro de Almeida, A. Martins, Marcus A. Nunes, L. Bezerra","doi":"10.1109/CBI54897.2022.00014","DOIUrl":"https://doi.org/10.1109/CBI54897.2022.00014","url":null,"abstract":"Time series forecasting is a consolidated, broadly used approach in several fields, such as finance and industry. Retail can also benefit from forecasting in many areas such as stock demand, price optimization, and sales. This study addresses retail sales forecasting in Nordestão, a large Brazilian supermarket chain that respectively ranks 3rd and 27th in sales regionally and nationally. The data considered spans five years of daily transactions from eight different stores. Knowingly effective machine learning techniques for forecasting are adopted, namely linear regression, random forests, and XGBoost. We further improve their performance with features we engineer to address seasonal effects. The best algorithm varies per store, but for most stores at least one of the methods proves effective. Importantly, the models display effective performance across multiple testing weeks, and improve over the current approach of Nordestão by a significant margin. Besides the traditional relevance of sales forecasting, our work is a means for Nordestão to evaluate the impact of the COVID-19 pandemics on sales.","PeriodicalId":447040,"journal":{"name":"2022 IEEE 24th Conference on Business Informatics (CBI)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122553520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Systematizing Business Process Redesign Initiatives with the BPR:Assessment Framework 用BPR系统化业务流程重新设计计划:评估框架
2022 IEEE 24th Conference on Business Informatics (CBI) Pub Date : 2022-06-01 DOI: 10.1109/CBI54897.2022.10044
George Tsakalidis, Nikolaos Nousias, Michael A. Madas, Kostas Vergidis
{"title":"Systematizing Business Process Redesign Initiatives with the BPR:Assessment Framework","authors":"George Tsakalidis, Nikolaos Nousias, Michael A. Madas, Kostas Vergidis","doi":"10.1109/CBI54897.2022.10044","DOIUrl":"https://doi.org/10.1109/CBI54897.2022.10044","url":null,"abstract":"Business process redesign (BPR) has emerged as a widely accepted practice within organizations for delivering better products and services and ensuring measurable benefits. Despite the adoption of BPR, it largely remains the result of a creative process and there is a lack of approaches for evaluating the potential impact of a BPR method before investing in its implementation. This means that BPR initiatives are selected based on ‘black-box’ generic options that are not explicitly tailored to the culture, structure, and existing processes of the organization. This paper aims to address this gap by introducing the BPR: Assessment Framework, a conceptual model based on Design Science Research Process (DSRP). The framework is intended to assess the BPR capacity of process models based on their plasticity and external quality. The usability of the framework is presented in the following manner: (a) through the demonstration of the framework using a data-intensive workflow optimization method as an end-to-end paradigm, and (b) the BPR capability assessment of 15 business process models from literature, to better demonstrate the benefits of omitting ineligible models prior to BPR application. The categorization of the redesign capability of models was based on a tested cluster analysis method using the k-means algorithm. Based on the findings, a considerable number of process models proved to be either overly constrained for the application of redesign heuristics or did not possess the required external quality to be redesigned. The contribution of the approach lies in the fact that the framework can also be extended to apply systematic BPR to eligible BPs. The framework can serve as a reliable measurement of the redesign capacity of candidate process models and as an essential part of a systematic methodology for increased BPR effectiveness.","PeriodicalId":447040,"journal":{"name":"2022 IEEE 24th Conference on Business Informatics (CBI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131744776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信