Semantic Filter
show all semantic filters
Found 21 articles
  • Predictive End-to-End Enterprise Process Network Monitoring

    PDF

    2023 | Business & Information Systems Engineering | Citations: 0

    Authors: Oberdorf, Felix; Schaschek, Myriam; Weinzierl, Sven; Stein, Nikolai; Matzner, Martin; Flath, Christoph M.

    Abstract: Ever-growing data availability combined with rapid progress in analytics has lai ... Expand

    Semantic filters: process log

    Topics: logistics management computer hardware workstation organizational context supply chain management

    Methods: event log machine learning case study longitudinal research deep learning

  • Why Work Around the Process? Analyzing Workarounds Through the Lens of the Theory of Planned Behavior

    PDF

    2023 | Business & Information Systems Engineering | Citations: 1

    Authors: Soffer, Pnina; Outmazgin, Nesi; Hadar, Irit; Tzafrir, Shay

    Abstract: Workarounds are a common practice in a broad range of organizational and technol ... Expand

    Semantic filters: process log

    Topics: business process improvement process mining business process management organizational context data security

    Methods: qualitative interview case study modeling language business process model and notation triangulation

    Theories: theory of workarounds theory of planned behavior technological frames of reference institutional theory activity theory

  • Creating business value with process mining

    PDF

    2022 | Journal of Strategic Information Systems | Citations: 0

    Authors: Badakhshan, Peyman; Wurm, Bastian; Grisold, Thomas; Geyer-Klingeberg, Jerome; Mendling, Jan; vom Brocke, Jan

    Abstract: Information systems research has a long-standing interest in how organizations g ... Expand

    Semantic filters: process log

    Topics: process mining value creation organizational value analytical information system business process management

    Methods: qualitative interview multiple case study qualitative coding personal interview grounded theory

    Theories: theory of affordance

  • Semi-Supervised Discovery of DNN-Based Outcome Predictors from Scarcely-Labeled Process Logs

    PDF

    2022 | Business & Information Systems Engineering | Citations: 0

    Authors: Folino, Francesco; Folino, Gianluigi; Guarascio, Massimo; Pontieri, Luigi

    Abstract: Predicting the final outcome of an ongoing process instance is a key problem in ... Expand

    Semantic filters: process log

    Topics: application programming interface Python business process management data breach database system

    Methods: machine learning semi-supervised learning experiment computational algorithm statistical hypothesis test

  • Multi-level Team Assignment in Social Business Processes: An Algorithm and Simulation Study

    PDF

    2022 | Information Systems Frontiers | Citations: 0

    Authors: Liu, Rong; Kumar, Akhil; Lee, Juhnyoung

    Abstract: Business Process Management (BPM) systems usually neglect the human and social a ... Expand

    Semantic filters: process log

    Topics: social network business process management resource allocation Python task complexity

    Methods: simulation computational algorithm experiment design science process log

  • OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs

    PDF

    2021 | Information Systems Frontiers | Citations: 0

    Authors: Deokar, Amit V.; Tao, Jie

    Abstract: Process Intelligence refers to the extraction and analysis of valuable knowledge ... Expand

    Semantic filters: process log

    Topics: resource allocation business process management organization structure mobile system internet of things

    Methods: event log computational algorithm case study business process modeling cluster analysis

  • Neural Process Mining: Multi-Headed Predictive Process Analytics in Practice

    2021 | European Conference On Information Systems | Citations: 0

    Authors: Oberdorf, Felix; Schaschek, Myriam; Stein, Nikolai; Flath, Christoph

    Abstract: Ever growing data availability combined with rapid progress in the field of ana ... Expand

    Semantic filters: process log

    Topics: process mining business process management

    Methods: artificial neural network process log computational algorithm deep learning machine learning

  • DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification

    PDF

    2021 | Information Systems Frontiers | Citations: 0

    Authors: Roy, Krishna Chandra; Chen, Qian

    Abstract: Ransomware is a self-propagating malware encrypting file systems of the compromi ... Expand

    Semantic filters: process log

    Topics: ransomware malware data encryption Linux Microsoft Windows

    Methods: machine learning deep learning term frequency–inverse document frequency experiment anomaly detection

  • A text analytics framework for automated communication pattern analysis

    PDF

    2020 | Information & Management | Citations: 4

    Authors: Fan, Shaokun; Ilk, Noyan

    Abstract: Human-coding reliant conversation analysis methods are ineffective when analyzin ... Expand

    Semantic filters: process log

    Topics: customer satisfaction customer service process mining knowledge sharing service quality

    Methods: computational algorithm case study qualitative content analysis ensemble learning machine learning

    Theories: speech act theory linguistics theory

  • A Novel Business Process Prediction Model Using a Deep Learning Method

    PDF

    2020 | Business & Information Systems Engineering | Citations: 6

    Authors: Mehdiyev, Nijat; Evermann, Joerg; Fettke, Peter

    Abstract: The ability to proactively monitor business processes is a main competitive diff ... Expand

    Semantic filters: process log

    Topics: business process management open source Microsoft Azure Java information retrieval

    Methods: deep learning experiment machine learning autoencoder classification method