Business Process Management
11th International Conference, BPM 2013, Bei**g, China, August 26-30, 2013. Proceedings
Chapter and Conference Paper
Food sampling programs are implemented from time to time in local areas or throughout the country in order to guarantee food safety and to improve food quality. The hidden patterns in the accumulated huge amou...
Chapter and Conference Paper
Abandoned industrial sites should be redeveloped in a sustainable way to reduce waste land. Planning support systems (PSSs) can help in the early planning phase by presenting possible outcomes of various redev...
Chapter and Conference Paper
Modeling landscapes in organizations suffer from the problem of information silos, where a number of process models, business rule repositories and other information artefacts may exist concurrently for the sa...
Chapter and Conference Paper
With the growing recognition that brands are valuable assets to organizations, the measurement of brand equity has thus been of interest to the academic and practice communities. Various approaches to measurin...
Chapter and Conference Paper
Hesitant fuzzy set is a very useful means to depict the decision information in the process of decision making. In this paper, motivated by the extension principle of hesitant fuzzy sets, we export Einstein op...
Chapter and Conference Paper
The literature on security research, such as information security and supply chain security, informs that it is highly intrusive in nature. This creates hindrances to researchers on develo** or testing theor...
Chapter and Conference Paper
So far, more than 2 million judgment documents represented in the same pattern and standard have come up in China, which can be viewed as a huge knowledge base. From 150 thousands judgment documents in 2012, a...
Book and Conference Proceedings
11th International Conference, BPM 2013, Bei**g, China, August 26-30, 2013. Proceedings
Chapter and Conference Paper
Traditional service composition approaches face the significant challenge of how to deal with massive individualized requirements. Such challenges include how to reach a tradeoff between one generalized soluti...
Chapter
Efficient and on-time execution of field tasks has been found to rely heavily on internal availability of inventories. However, the lack of flexibility in the way information flows along the logistics chain ha...
Chapter and Conference Paper
Clinical care pathway analysis is the process of discovering how clinical activities impact patients in their care journeys, and uses the discovered knowledge for various applications including the redesign an...
Chapter and Conference Paper
There has been an increased amount of discussion about firms needing to account for the hacker’s perspective in protecting their information assets. However, we still have very little idea about how attack inf...
Chapter and Conference Paper
To start with, literatures of the CODP theory and the researches on the hybrid push/pull production system are reviewed. CODP is the point where push production integrate with the push production mode, therefo...
Chapter and Conference Paper
Previous studies have explored the impact of online reviews on product sales at the aggregate level. This study contributes to the literature by investigating how online reviews take effect at the individual c...
Chapter and Conference Paper
In order to help service designers build high-quality service models quickly and accurately, this paper presents a value-oriented iterative service modeling process. This modeling process combines service busi...
Chapter and Conference Paper
According to E-government maturity model, Leavitt’s Diamond model, Fountain’s technology enactment framework and IT governance theory, this paper discusses the important impact that IT governance bring in the ...
Chapter and Conference Paper
This study explores how distinct information access patterns affect a supplier’s supply chain agility. A supplier’s specific investments for IT-enabled supply chain coordination and relational adaptation in su...
Chapter and Conference Paper
IT-enabled business processes support firm agility, and business process standardization has become an essential part of IT architecture. Business process standardization value partly comes from the real optio...
Chapter and Conference Paper
People use search engines to seek information. This study investigates the motives that drive the search for information security knowledge via a search engine. We empirically examine the effects of network at...
Chapter and Conference Paper
Although customer loyalty has been widely examined in various Internet contexts, the conceptualization and empirical validation of a customer loyalty model for social networking sites (SNSs) has not been addre...