scispace - formally typeset
Search or ask a question

Showing papers in "Enterprise Information Systems in 2017"


Journal ArticleDOI
TL;DR: Using the features of information systems use studies and data from a case study with 14 EA stakeholder interviews, 15 EA artefact use situations are identified and described, resulting in a theoretical framework for understanding their use in general.
Abstract: As a tool for management and planning, Enterprise Architecture EA can potentially align organisations’ business processes, information, information systems and technology towards a common goal, and supply the information required within this journey. However, an explicit view on why, how, when and by whom EA artefacts are used in order to realise its full potential is not defined. Utilising the features of information systems use studies and data from a case study with 14 EA stakeholder interviews, we identify and describe 15 EA artefact use situations that are then reflected in the related literature. Their analysis enriches understanding of what are EA artefacts, how and why they are used and when are they used, and results in a theoretical framework for understanding their use in general.

71 citations


Journal ArticleDOI
TL;DR: A function block-based integration mechanism is developed to connect various types of production resources and a Cloud-based architecture is also deployed to offer a service pool which maintains these resources as production services.
Abstract: Cloud computing is the new enabling technology that offers centralised computing, flexible data storage and scalable services. In the manufacturing context, it is possible to utilise the Cloud technology to integrate and provide industrial resources and capabilities in terms of Cloud services. In this paper, a function block-based integration mechanism is developed to connect various types of production resources. A Cloud-based architecture is also deployed to offer a service pool which maintains these resources as production services. The proposed system provides a flexible and integrated information environment for the Cloud-based production system. As a specific type of manufacturing, Waste Electrical and Electronic Equipment WEEE remanufacturing experiences difficulties in system integration, information exchange and resource management. In this research, WEEE is selected as the example of Internet of Things to demonstrate how the obstacles and bottlenecks are overcome with the help of Cloud-based informatics approach. In the case studies, the WEEE recycle/recovery capabilities are also integrated and deployed as flexible Cloud services. Supporting mechanisms and technologies are presented and evaluated towards the end of the paper.

68 citations


Journal ArticleDOI
TL;DR: A system to prevent and control the spread of Zika virus disease using integration of Fog computing, cloud computing, mobile phones and the Internet of things (IoT)-based sensor devices is proposed.
Abstract: Zika virus is a mosquito-borne disease that spreads very quickly in different parts of the world. In this article, we proposed a system to prevent and control the spread of Zika virus disease using integration of Fog computing, cloud computing, mobile phones and the Internet of things (IoT)-based sensor devices. Fog computing is used as an intermediary layer between the cloud and end users to reduce the latency time and extra communication cost that is usually found high in cloud-based systems. A fuzzy k-nearest neighbour is used to diagnose the possibly infected users, and Google map web service is used to provide the geographic positioning system (GPS)-based risk assessment to prevent the outbreak. It is used to represent each Zika virus (ZikaV)-infected user, mosquito-dense sites and breeding sites on the Google map that help the government healthcare authorities to control such risk-prone areas effectively and efficiently. The proposed system is deployed on Amazon EC2 cloud to evaluate its per...

66 citations


Journal ArticleDOI
TL;DR: An attempt is made to summarise the current state of the art of how IT can affect SSCM in any structured way and to compare it with IT for ‘general’ SCM to give guidance for future research.
Abstract: In supply chain management (SCM), two topics have gained importance over the last years. On the one hand, sustainable SCM (SSCM) has become increasingly relevant and many publications have contributed to the topic. On the other hand, information technology (IT) is being progressively considered as a key enabler for efficiency in supply chains. Several research efforts have contributed to the field of IT for SSCM. However, this paper is the first recent attempt to summarise the current state of the art of how IT can affect SSCM in any structured way and to compare it with IT for ‘general’ SCM to give guidance for future research. This paper surveys 55 peer-reviewed articles that were retrieved through keyword searches (until May 2014). The analysis identifies research deficits as well as a lack of scientific discourse employing empirical techniques and a lack of investigations on the social sustainability. Additionally, possible topics for further research were derived by comparing the survey’s res...

54 citations


Journal ArticleDOI
TL;DR: The challenges facing business PMs are presented, such as misalignment between business and IT, difficulty of deriving IT goals from business goals, creating secured business PM, reengineering BPs, managing the rapidly changing BP and business environment and managing customer power, and the limitations of existing business PM frameworks are presented.
Abstract: The current literature shows that creating a good framework on business process model (PM) is not an easy task. A successful business PM should have the ability to ensure accurate alignment between...

37 citations


Journal ArticleDOI
TL;DR: A new semantic similarity measure combining functional similarity and process similarity is defined and a service discovery mechanism that utilises the new semantic similarities measure for service matching is presented.
Abstract: With the rapid development of electronic business, Web services have attracted much attention in recent years. Enterprises can combine individual Web services to provide new value-added services. An emerging challenge is the timely discovery of close matches to service requests among large service pools. In this study, we first define a new semantic similarity measure combining functional similarity and process similarity. We then present a service discovery mechanism that utilises the new semantic similarity measure for service matching. All the published Web services are pre-grouped into functional clusters prior to the matching process. For a user’s service request, the discovery mechanism first identifies matching services clusters and then identifies the best matching Web services within these matching clusters. Experimental results show that the proposed semantic discovery mechanism performs better than a conventional lexical similarity-based mechanism.

36 citations


Journal ArticleDOI
TL;DR: The value engineering (VE) method forms the basis of the proposed framework, which integrates Six Sigma tools, and the results show improvements in customer response time and operational efficiency in terms of work-in-process and turnover of materials.
Abstract: Enterprise resource planning (ERP) is a software solution that integrates the operational processes of the business functions of an enterprise. However, implementing ERP systems is a complex process. In addition to the technical issues, companies must address problems associated with business process re-engineering, time and budget control, and organisational change. Numerous industrial studies have shown that the failure rate of ERP implementation is high, even for well-designed systems. Thus, ERP projects typically require a clear methodology to support the project execution and effectiveness. In this study, we propose a theoretical model for ERP implementation. The value engineering (VE) method forms the basis of the proposed framework, which integrates Six Sigma tools. The proposed framework encompasses five phases: knowledge generation, analysis, creation, development and execution. In the VE method, potential ERP problems related to software, hardware, consultation and organisation are analy...

33 citations


Journal ArticleDOI
TL;DR: A 2.4-GHz radio frequency and ultra-wide bandwidth (UWB) hybrid real-time locating system (RTLS) for industrial enterprise Internet of Things (IoT) and the specified communication protocol and the adaptive tag synchronisation rate ensure reliable and deterministic access with a scalable system capacity.
Abstract: This paper presents a 2.4-GHz radio frequency RF and ultra-wide bandwidth UWB hybrid real-time locating system RTLS for industrial enterprise Internet of Things IoT. It employs asymmetric wireless link, that is, UWB radio is utilised for accurate positioning up to 10 cm in critical sites, whereas 2.4-GHz RF is used for tag control and coarse positioning in non-critical sites. The specified communication protocol and the adaptive tag synchronisation rate ensure reliable and deterministic access with a scalable system capacity and avoid unpredictable latency and additional energy consumption of retransmissions due to collisions. The tag, consisting of a commercial 2.4-GHz transceiver and a customised application-specific integrated circuit ASIC UWB transmitter Tx, is able to achieve up to 3 years’ battery life at 1600 tags per position update second with 1000 mAh battery in one cluster. The time difference of arrival TDoA–based positioning experiment at UWB radio is performed on the designed software-defined radio SDR platform.

29 citations


Journal ArticleDOI
TL;DR: A unified enterprise modelling approach named Enterprise Pattern (EP) is provided which bridges the gap between the BP model and the enterprise economic model of MSC and forms the language syntaxes and two basic extraction rules assisting economic analysis.
Abstract: Modern service company (MSC), the enterprise involving special domains, such as the financial industry, information service industry and technology development industry, depends heavily on information technology. Modelling of such enterprise has attracted much research attention because it promises to help enterprise managers to analyse basic business strategies (e.g. the pricing strategy) and even optimise the business process (BP) to gain benefits. While the existing models proposed by economists cover the economic elements, they fail to address the basic BP and its relationship with the economic characteristics. Those proposed in computer science regardless of achieving great success in BP modelling perform poorly in supporting the economic analysis. Therefore, the existing approaches fail to satisfy the requirement of enterprise modelling for MSC, which demands simultaneous consideration of both economic analysing and business processing. In this article, we provide a unified enterprise modelling appr...

27 citations


Journal ArticleDOI
TL;DR: This work develops heuristic algorithms to solve the total cost minimisation problem and to provide a cost-aware request routing for joint optimisation of the selection of ISPs and the number of servers in distributed CDCs and proposes a regression-based workload prediction method to obtain future incoming workload.
Abstract: Current geographically distributed cloud data centres CDCs require gigantic energy and bandwidth costs to provide multiple cloud applications to users around the world. Previous studies only focus on energy cost minimisation in distributed CDCs. However, a CDC provider needs to deliver gigantic data between users and distributed CDCs through internet service providers ISPs. Geographical diversity of bandwidth and energy costs brings a highly challenging problem of how to minimise the total cost of a CDC provider. With the recently emerging software-defined networking, we study the total cost minimisation problem for a CDC provider by exploiting geographical diversity of energy and bandwidth costs. We formulate the total cost minimisation problem as a mixed integer non-linear programming MINLP. Then, we develop heuristic algorithms to solve the problem and to provide a cost-aware request routing for joint optimisation of the selection of ISPs and the number of servers in distributed CDCs. Besides, to tackle the dynamic workload in distributed CDCs, this article proposes a regression-based workload prediction method to obtain future incoming workload. Finally, this work evaluates the cost-aware request routing by trace-driven simulation and compares it with the existing approaches to demonstrate its effectiveness.

26 citations


Journal ArticleDOI
TL;DR: This special issue is to present readers with some representative achievements in utilising advanced IT to address emerging challenges for design and operation of complex products and systems.
Abstract: Industrial Informatics (II) refers to the study of design, use and innovation of information technology (IT) in industrial applications (Holmstrom, Wiberg, and Lund 2010) II aims at knowledge-base

Journal ArticleDOI
TL;DR: A new ontology-based case-based reasoning (OBCBR) approach that utilises an enterprise ontology is introduced in this article to improve the accessibility of project knowledge obtained from experiences.
Abstract: The accessibility of project knowledge obtained from experiences is an important and crucial issue in enterprises. This information need about project knowledge can be different from one person to another depending on the different roles he or she has. Therefore, a new ontology-based case-based reasoning OBCBR approach that utilises an enterprise ontology is introduced in this article to improve the accessibility of this project knowledge. Utilising an enterprise ontology improves the case-based reasoning CBR system through the systematic inclusion of enterprise-specific knowledge. This enterprise-specific knowledge is captured using the overall structure given by the enterprise ontology named ArchiMEO, which is a partial ontological realisation of the enterprise architecture framework EAF ArchiMate. This ontological representation, containing historical cases and specific enterprise domain knowledge, is applied in a new OBCBR approach. To support the different information needs of different stakeholders, this OBCBR approach has been built in such a way that different views, viewpoints, concerns and stakeholders can be considered. This is realised using a case viewpoint model derived from the ISO/IEC/IEEE 42010 standard. The introduced approach was implemented as a demonstrator and evaluated using an application case that has been elicited from a business partner in the Swiss research project.

Journal ArticleDOI
TL;DR: New insights are offered into the implied assumptions of current EA maturity models and initial concepts and constructs are offered to guide the conceptualisation, construction and refinement of enterprise maturity models.
Abstract: In order to aid organisations in the adoption of enterprise architecture (EA) best practices, maturity models have been proposed in the literature. These models offer organisational roadmaps and assessment frameworks for increasing EA maturity. However, key questions concerning the implied meaning of the term maturity in the context of these models have been left unexplored by previous research. This research, aided by the field of organisational learning, offers new insights into the implied assumptions of current EA maturity models and offers initial concepts and constructs to guide the conceptualisation, construction and refinement of enterprise maturity models.

Journal ArticleDOI
TL;DR: This work proposes a reward-based SC method that achieves acceptable utility as measured by task assignment success rates, while efficiently preserving privacy, and presents a reward allocation mechanism that adjusts each piece of the reward for a task using the distribution of the workers’ locations.
Abstract: In recent years, the popularity of mobile devices has transformed spatial crowdsourcing (SC) into a novel mode for performing complicated projects. Workers can perform tasks at specified locations in return for rewards offered by employers. Existing methods ensure the efficiency of their systems by submitting the workers’ exact locations to a centralised server for task assignment, which can lead to privacy violations. Thus, implementing crowsourcing applications while preserving the privacy of workers’ location is a key issue that needs to be tackled. We propose a reward-based SC method that achieves acceptable utility as measured by task assignment success rates, while efficiently preserving privacy. A differential privacy model ensures rigorous privacy guarantee, and Laplace noise is introduced to protect workers’ exact locations. We then present a reward allocation mechanism that adjusts each piece of the reward for a task using the distribution of the workers’ locations. Through experimental ...

Journal ArticleDOI
TL;DR: Results show that firms with a greater propensity to assimilate the new enterprise resource planning (ERP) version have a higher assessment of relative advantage, IS technical competence, and the strategic role of IS relative to those companies with a lower propensity to integrate a new ERP version.
Abstract: The purpose of this study is to gain a better understanding of the differences in the propensity of firms to initiate and commit to the assimilation of an enterprise technology upgrade. A research model is proposed that examines the influences that four technological and four organisational factors have on predicting assimilation of a technology upgrade. Results show that firms with a greater propensity to assimilate the new enterprise resource planning ERP version have a higher assessment of relative advantage, IS technical competence, and the strategic role of IS relative to those firms with a lower propensity to assimilate a new ERP version.

Journal ArticleDOI
TL;DR: A tailored enterprise application architecture description framework and its corresponding design method that can effectively support service-oriented architecting and cloud computing by creating the metadata model based on architecture content framework, DoDAF metamodel (DM2) and Cloud Computing Modelling Notation (CCMN).
Abstract: For the purpose of supporting the design and analysis of enterprise application architecture, here, we report a tailored enterprise application architecture description framework and its corresponding design method. The presented framework can effectively support service-oriented architecting and cloud computing by creating the metadata model based on architecture content framework ACF, DoDAF metamodel DM2 and Cloud Computing Modelling Notation CCMN. The framework also makes an effort to extend and improve the mapping between The Open Group Architecture Framework TOGAF application architectural inputs/outputs, deliverables and Department of Defence Architecture Framework DoDAF-described models. The roadmap of 52 DoDAF-described models is constructed by creating the metamodels of these described models and analysing the constraint relationship among metamodels. By combining the tailored framework and the roadmap, this article proposes a service-oriented enterprise application architecture development process. Finally, a case study is presented to illustrate the results of implementing the tailored framework in the Southern Base Management Support and Information Platform construction project using the development process proposed by the paper.

Journal ArticleDOI
TL;DR: This article presents a new two-stage spreading and forwarding dynamic routing algorithm based on the proposed social activity degree and physical contact factor for mobile customers that can significantly increase the delivery ratio of messages, and decrease the overhead ratio and average delay of messages.
Abstract: Sudden disasters such as earthquake, flood and hurricane necessitate the employment of communication networks to carry out emergency response activities. Routing has a significant impact on the functionality, performance and flexibility of communication networks. In this article, the routing problem is studied considering the delivery ratio of messages, the overhead ratio of messages and the average delay of messages in mobile opportunistic networks MONs for enterprise-level emergency response communications in sudden disaster scenarios. Unlike the traditional routing methods for MONS, this article presents a new two-stage spreading and forwarding dynamic routing algorithm based on the proposed social activity degree and physical contact factor for mobile customers. A new modelling method for describing a dynamic evolving process of the topology structure of a MON is first proposed. Then a multi-copy spreading strategy based on the social activity degree of nodes and a single-copy forwarding strategy based on the physical contact factor between nodes are designed. Compared with the most relevant routing algorithms such as Epidemic, Prophet, Labelled-sim, Dlife-comm and Distribute-sim, the proposed routing algorithm can significantly increase the delivery ratio of messages, and decrease the overhead ratio and average delay of messages.

Journal ArticleDOI
TL;DR: A conceptual framework for supporting the management of collaborative situations in the case of Original equipment manufacturers (OEMs) based on the concept of trust level is proposed, which proposes a classification of different collaboration modes to be adopted in various contexts of inter-enterprise relationships, in manufacturing sector.
Abstract: Due to the increased competitiveness and the diversity of requirements in today’s markets, manufacturing companies need to join their competencies and resources to propose innovative solutions for each specific market, with the possibility to transpose these solutions to another market, by means of slight adaptations. Thus, manufacturing firms must constantly conduct new collaborations with known partners in most cases, but also with new partners. The critical question for managers in this latter case is how to define the best collaborative strategy according to the goals of the project and the specificity of the target market. This paper tackles the problem by proposing a conceptual framework for supporting the management of collaborative situations in the case of Original equipment manufacturers (OEMs). Based on the concept of trust level, the framework proposes a classification of different collaboration modes to be adopted in various contexts of inter-enterprise relationships, in manufacturing...

Journal ArticleDOI
TL;DR: A novel method to analyse and substitute Web services based on Web service clusters is proposed and can be readily applied to e-commerce service substitution to meet the business automation needs.
Abstract: Service substitution is an important research topic in the fields of Web services and service-oriented computing. This work presents a novel method to analyse and substitute Web services. A new concept, called a Service Cluster Net Unit, is proposed based on Web service clusters. A service cluster is converted into a Service Cluster Net Unit. Then it is used to analyse whether the services in the cluster can satisfy some service requests. Meanwhile, the substitution methods of an atomic service and a composite service are proposed. The correctness of the proposed method is proved, and the effectiveness is shown and compared with the state-of-the-art method via an experiment. It can be readily applied to e-commerce service substitution to meet the business automation needs.

Journal ArticleDOI
TL;DR: A personalised manufacturing service recommendation approach, which combines a PageRank-based reputation model and a collaborative filtering technique in a unified framework for recommending the right manufacturing services to an active service user for supply chain deployment.
Abstract: The number of manufacturing services for cross-enterprise business collaborations is increasing rapidly because of the explosive growth of Web service technologies. This trend demands intelligent and robust models to address information overload in order to enable efficient discovery of manufacturing services. In this paper, we present a personalised manufacturing service recommendation approach, which combines a PageRank-based reputation model and a collaborative filtering technique in a unified framework for recommending the right manufacturing services to an active service user for supply chain deployment. The novel aspect of this research is adapting the PageRank algorithm to a network of service-oriented multi-echelon supply chain in order to determine both user reputation and service reputation. In addition, it explores the use of these methods in alleviating data sparsity and cold start problems that hinder traditional collaborative filtering techniques. A case study is conducted to validate the practicality and effectiveness of the proposed approach in recommending the right manufacturing services to active service users.

Journal ArticleDOI
TL;DR: This paper examines how online reviews impact on business strategies, in this case, exhibitor behaviour, through an empirical analysis of movie industry, and results indicate that the online user reviews’ rating is positively associated with the number of screens, confirming that theOnline review is influential on exhibitors behaviour.
Abstract: This paper explores the effects of online reviews in the empirical context of movie industry. Quality uncertainty and hedonic consumption render movies a particularly interesting category to study quality signals and social influence. Online consumer chatters about a movie are readily available in popular movie-related websites. These data, coupled with movie-specific sales and advertising information accessible online or from commercial sources, provide unique opportunity to explore the implication of word-of-mouth (WOM) for consumer behaviour and business strategy. We thus examine how online reviews impact on business strategies, in this case, exhibitor behaviour, through an empirical analysis of movie industry. First, online reviews are grouped into user reviews and critic reviews. We then use them respectively in two simultaneous equation systems, which regard online reviews, box office revenue and the number of screens as endogenous variables. Next, a three-stage least-square procedure is emp...

Journal ArticleDOI
TL;DR: The Honeycomb model is empirically tested as a tool that enhances the technological agility of social media and provides dynamism to social media strategy formation, continuous improvement of strategy development in support of greater business agility.
Abstract: There is an increased focus on research involving social media This research however has failed to catch up with the pace of the technology development and may prove disadvantageous for both practice and theory The longitudinal study presented in the paper was conducted over a 3-year period involving Australian banks and popular social media technologies The paper empirically tests the Honeycomb model as a tool that enhances the technological agility of social media The paper fills a key research gap and provides dynamism to social media strategy formation, continuous improvement of strategy development in support of greater business agility

Journal ArticleDOI
TL;DR: This work conducted research in communities in which content attracts discussion and new members and examined the evolution patterns of social and content networks in a topic-oriented Douban group to find characteristics associated with the network’s UGC worth evaluating.
Abstract: As platforms based on user-generated content (UGC), social media platforms emphasise the social ties between users and user participation, which promote the communication and propagation of ideas and help to build and maintain relationships. However, many researchers have studied only predefined social networks, such as academic social networks. We believe that there are certain characteristics associated with the network’s UGC worth evaluating. We conducted research in communities in which content attracts discussion and new members and examined the evolution patterns of social and content networks in a topic-oriented Douban group. Datasets of user and content information in communities of interest were collected through web crawler software. Networks based on social and content ties were constructed and analysed. We chose scale, density, centrality, average path length and cluster coefficient as measures for exploring the evolution and correlation of both types of networks. These findings are va...

Journal ArticleDOI
TL;DR: A security solution based on digital watermarking is adopted to achieve the secure communications for wireless sensor networks in smart grid by data and entity authentications at a low cost of operation.
Abstract: As more and more wireless sensor nodes and networks are employed to acquire and transmit the state information of power equipment in smart grid, we are in urgent need of some viable security solutions to ensure secure smart grid communications. Conventional information security solutions, such as encryption/decryption, digital signature and so forth, are not applicable to wireless sensor networks in smart grid any longer, where bulk messages need to be exchanged continuously. The reason is that these cryptographic solutions will account for a large portion of the extremely limited resources on sensor nodes. In this article, a security solution based on digital watermarking is adopted to achieve the secure communications for wireless sensor networks in smart grid by data and entity authentications at a low cost of operation. Our solution consists of a secure framework of digital watermarking, and two digital watermarking algorithms based on alternating electric current and time window, respectively. Both watermarking algorithms are composed of watermark generation, embedding and detection. The simulation experiments are provided to verify the correctness and practicability of our watermarking algorithms. Additionally, a new cloud-based architecture for the information integration of smart grid is proposed on the basis of our security solutions.

Journal ArticleDOI
TL;DR: Techniques to represent and analyse state spaces with 250 million states on a normal PC and how the operational support in ProM can be used in combination with an existing operational support provider are presented.
Abstract: Operational support provides, during the execution of a business process, replies to questions such as ‘how do I end the execution of the process in the cheapest way?’ and ‘is my execution compliant with some expected behaviour?’ These questions may be asked several times during a single execution and, to answer them, dedicated software components the so-called operational support providers need to be invoked. Therefore, an infrastructure is needed to handle multiple providers, maintain data between queries about the same execution and discard information when it is no longer needed. In this paper, we use coloured Petri nets CPNs to model and analyse software implementing such an infrastructure. This analysis is needed to clarify the requirements before implementation and to guarantee that the resulting software is correct. To this aim, we present techniques to represent and analyse state spaces with 250 million states on a normal PC. We show how the specified requirements have been implemented as a plug-in of the process mining tool ProM and how the operational support in ProM can be used in combination with an existing operational support provider.

Journal ArticleDOI
TL;DR: This research adopts a design structure matrix simulation approach analysis to propose an optimal enterprise SCM-networked value-adding, customised master data-management platform/portal for efficient SCM network information exchange and an effective supply-chain (SC) network systems–design teams’ structure.
Abstract: Supply-chain management SCM in manufacturing industries has evolved significantly over the years. Recently, a lot more relevant research has picked up on the development of integrated solutions. Thus, seeking a collaborative optimisation of geographical, just-in-time JIT, quality customer demand/satisfaction and return-on-investment profits, aspects of organisational management and planning through ‘best practice’ business-process management – concepts and application; employing system tools such as certain applications/aspects of enterprise resource planning ERP – SCM systems information technology IT enablers to enhance enterprise integrated product development/concurrent engineering principles. This article assumed three main organisation theory applications in positioning its assumptions. Thus, proposing a feasible industry-specific framework not currently included within the SCOR model’s level four 4 implementation level, as well as other existing SCM integration reference models such as in the MIT process handbook’s – Process Interchange Format PIF, the TOVE project, etc. which could also be replicated in other SCs. However, the wider focus of this paper’s contribution will be concentrated on a complimentary proposed framework to the SCC’s SCOR reference model. Quantitative empirical closed-ended questionnaires in addition to the main data collected from a qualitative empirical real-life industrial-based pilot case study were used: To propose a conceptual concurrent enterprise framework for SCM network activities. This research adopts a design structure matrix simulation approach analysis to propose an optimal enterprise SCM-networked value-adding, customised master data-management platform/portal for efficient SCM network information exchange and an effective supply-chain SC network systems–design teams’ structure. Furthermore, social network theory analysis will be employed in a triangulation approach with statistical correlation analysis to assess the scale/level of frequency, importance, level of collaborative-ness, mutual trust as well as roles and responsibility among the enterprise SCM network for systems product development PD design teams’ technical communication network as well as extensive literature reviews.

Journal ArticleDOI
TL;DR: A prototype of the proposed collaborative recommendation system was implemented and evaluated in a controlled environment simulating the real-world situation of professional software engineers, achieving promising initial results on the precision and recall performance of the system.
Abstract: The importance of information retrieval systems is unquestionable in the modern society and both individuals as well as enterprises recognise the benefits of being able to find information effectively. Current code-focused information retrieval systems such as Google Code Search, Codeplex or Koders produce results based on specific keywords. However, these systems do not take into account developers’ context such as development language, technology framework, goal of the project, project complexity and developer’s domain expertise. They also impose additional cognitive burden on users in switching between different interfaces and clicking through to find the relevant code. Hence, they are not used by software developers. In this paper, we discuss how software engineers interact with information and general-purpose information retrieval systems e.g. Google, Yahoo! and investigate to what extent domain-specific search and recommendation utilities can be developed in order to support their work-related activities. In order to investigate this, we conducted a user study and found that software engineers followed many identifiable and repeatable work tasks and behaviours. These behaviours can be used to develop implicit relevance feedback-based systems based on the observed retention actions. Moreover, we discuss the implications for the development of task-specific search and collaborative recommendation utilities embedded with the Google standard search engine and Microsoft IntelliSense for retrieval and re-engineering of code. Based on implicit relevance feedback, we have implemented a prototype of the proposed collaborative recommendation system, which was evaluated in a controlled environment simulating the real-world situation of professional software engineers. The evaluation has achieved promising initial results on the precision and recall performance of the system.

Journal ArticleDOI
TL;DR: A decomposition approach is proposed to divide large process models and event logs into several separate parts that can be analysed independently; while an alignment approach based on a state equation method in PN theory enhances the performance of conformance checking.
Abstract: When business processes are mostly supported by information systems, the availability of event logs generated from these systems, as well as the requirement of appropriate process models are increa...

Journal ArticleDOI
TL;DR: A genetic algorithm based approach, which takes into account the execution time, price, transactional property and successful execution rate of CWS, is presented to achieve global optimisation service selection.
Abstract: As there are various risks of failure when Web services are deployed in unreliable environment, the execution of a composite Web service CWS requires the transaction mechanism to guarantee its reliable execution. However, the existing service selection approaches consider QoS and transaction separately and have not considered that transactional properties may affect the QoS such as the execution time of a CWS. This work addresses the importance of considering transactional properties and how the transactional properties affect the QoS simultaneously in the process of service selection by a QoS-aware and transactional-aware selection approach. First, a performance evaluation method is proposed to calculate the execution time of a transactional CWS. Then, a genetic algorithm based approach, which takes into account the execution time, price, transactional property and successful execution rate of CWS, is presented to achieve global optimisation service selection. Finally, experimental results show the efficiency and effectiveness of the approach.

Journal ArticleDOI
TL;DR: It is proposed that end-users’ computer self-efficacy (CSE) and mastery orientation (MO), as well as the perceived ease-of-use (PEOU) of a system, influence their motivation to transfer the skills they have gained during training to their work environment and to use the system.
Abstract: Enterprise systems (ES) are large software packages that have been widely adopted, but are complex to deploy One way to obtain more value from them is to train end-users However, little is known about the effectiveness of ES training This study examines post-training behaviour in the ES environment through the concept of training transfer and the theoretical framework of self-determination theory It proposes that end-users’ computer self-efficacy (CSE) and mastery orientation (MO), as well as the perceived ease-of-use (PEOU) of a system, influence their motivation to transfer the skills they have gained during training to their work environment and to use the system Data was collected from 170 ES end-users, who had previously attended ES training, through a survey Partial least squares modelling was used to analyse the data, and all of the hypotheses were supported This study is among the first few studies that investigate the more distal impact of information systems training