Queensland Treasury Corporation

Displaying 1-40 of 119 results

  • White Papers // Mar 2014

    Challenges of Knowledge Integration in Small and Medium Enterprises

    In this paper, the authors attempt to develop a better understanding of the challenges of Knowledge Integration (KI) within the innovation process in Small and Medium Enterprises (SMEs). Using several case studies, this study investigates how knowledge integration may be managed within the context of innovation in SMEs. The paper...

    Provided By Queensland Treasury Corporation

  • White Papers // Jan 2014

    Intelligent Data Analysis: Issues and Challenges

    Today with the advances of technology, mountainous amounts of data are now available in science, business, industry and many other areas. Evaluation of these collected data may lead to the discovery of trends and patterns hidden within the data that increase the working efficiency and improve the quality of decision...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2013

    Multi-Ciphersuite Security and the SSH Protocol

    Real-world cryptographic protocols, such as the Transport Layer Security (TLS) and Secure SHell (SSH) protocols, support the negotiation of different combinations of cryptographic algorithms, often known as cipher-suites. An individual cipher-suite can be modeled as an Authenticated and Confidential Channel Establishment (ACCE) protocol, and recently all widely deployed TLS cipher-suites...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2013

    Profiling Event Logs to Configure Risk Indicators for Process Delays

    Risk identification is one of the most challenging stages in the risk management process. Conventional risk management approaches provide little guidance and companies often rely on the knowledge of experts for risk identification. In this paper, the authors demonstrate how risk indicators can be used to predict process delays via...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2013

    Slice, Mine and Dice: Complexity-Aware Automated Discovery of Business Process Models

    Automated process discovery techniques aim at extracting models from information system logs in order to shed light into the business processes supported by these systems. Existing techniques in this space are effective when applied to relatively small or regular logs, but otherwise generate large and spaghetti-like models. In previous paper,...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2013

    Double-Authentication-Preventing Signatures

    The digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, the certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2013

    Usability and Security of Gaze-Based Graphical Grid Passwords

    The authors present and analyze several gaze-based graphical pass-word schemes based on recall and cued-recall of grid points; eye-trackers are used to record user's gazes, which can prevent shoulder-surfing and may be suitable for users with disabilities. Their 22-subject study ob-serves that success rate and entry time for the grid-based...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2013

    Modelling the Contribution of Knowledge Management Towards Achieving Organisational Business Objectives

    Knowledge Management (KM) continues to receive mounting interest within the construction industry due to its potential to offer solutions for organizations seeking competitive advantage. This paper presents a KM input-process output conceptual model comprising unique and well-defined theoretical constructs representing KM practices and their internal and external determinants in the...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2013

    Improving Opportunity Recognition and Business Performance in Small and Medium Manufacturing Enterprises Through Design Innovation Programs

    Increasing awareness of the benefits of stimulating entrepreneurial behavior in small and medium enterprises has fostered strong interest in innovation programs. Recently many western countries have invested in design innovation for better firm performance. This research presents some early findings from a study of companies that participated in a holistic...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2013

    A Software Framework for Risk-Aware Business Process Management

    With the large diffusion of Business Process Management (BPM) automation suites, the possibility of managing process-related risks arises. This paper introduces an innovative framework for process-related risk management and describes a working implementation realized by extending the YAWL system. The framework covers three aspects of risk management: risk monitoring, risk...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2013

    What Is the Role of Design-Led Innovation and Design-Led Prototyping in Developing Novel Business Models?

    Recently, 'Business model' and 'Business model innovation' have gained substantial attention in management literature and practice. However, many firms lack the capability to develop a novel business model to capture the value from new technologies. Existing literature on business model innovation highlights the central role of 'Customer value'. Further, it...

    Provided By Queensland Treasury Corporation

  • White Papers // Mar 2013

    Which Cultural Values Matter to Business Process Management? Results From a Global Delphi Study

    Business Process Management (BPM) requires a holistic perspective that includes managing the culture of an organization to achieve objectives of efficient and effective business processes. Still, the specifics of a BPM-supportive organizational culture have not been examined so far. Thus, the purpose of the authors' paper is to identify the...

    Provided By Queensland Treasury Corporation

  • White Papers // Feb 2013

    Operational Semantics of Aspects in Business Process Management

    Aspect orientation is an important approach to address complexity of cross-cutting concerns in Information Systems. This approach encapsulates these concerns separately and composes them to the main module when needed. Although there are different works which shows how this separation should be performed in process models, the com-position of them...

    Provided By Queensland Treasury Corporation

  • White Papers // Feb 2013

    State Convergence in Bit-Based Stream Ciphers

    Modern stream cipher applications use a secret key and a publicly known Initialisation Vector (IV) to form an initial internal state for the key-stream generator, before key-stream generation begins. Well-designed initialization and key-stream generation processes for stream ciphers should ensure that each key-IV pair generates a distinct key-stream. In this...

    Provided By Queensland Treasury Corporation

  • White Papers // Feb 2013

    A Survey of Trust and Reputation Systems for Online Service Provision

    Trust and reputation systems represent a significant trend in decision support for internet mediated service provision. The basic idea is to let parties rate each other, for example after the completion of a transaction and use the aggregated ratings about a given party to derive a trust or reputation score,...

    Provided By Queensland Treasury Corporation

  • White Papers // Jan 2013

    Formal Semantics and Analysis of Control Flow in WS-BPEL

    Web service composition refers to the creation of new (Web) services by combination of functionality provided by existing ones. This paradigm has gained significant attention in the Web services community and is seen as a pillar for building service-oriented applications. A number of domain-specific languages for service composition have been...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2012

    Fragment-based Version Management for Repositories of Business Process Models

    As organizations reach higher levels of Business Process Management maturity, they tend to accumulate large collections of process models. These repositories may contain thousands of activities and be managed by different stakeholders with varying skills and responsibilities. However, while being of great value, these repositories induce high management costs. Thus,...

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2012

    Public, Private, or Hybrid? What the Upstream Oil & Gas Industry Can Learn From Other Sectors About \"The Cloud\"

    Despite the compelling case for moving towards cloud computing, the upstream oil & gas industry faces several technical challenges - most notably, a pronounced emphasis on data security, a reliance on extremely large data sets, and significant legacy investments in Information Technology (IT) infrastructure - that make a full migration...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2012

    A Business Model for an Inclusive Entrepreneurial Development

    In 2004 Prahalad made managers aware of the great economic opportunity that the population at the BoP (Base of the Pyramid) represents for business in the form of new potential consumers. However, MNCs (Multi-National Corporations) generally continue to penetrate low income markets with the same strategies used at the top...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2012

    Applying Social Technology to Business Process Lifecycle Management

    In recent years, social technologies such as wikis, blogs or micro-blogging have seen an exponential growth in the uptake of their user base making this type of technology one of the most significant networking and knowledge sharing platforms for potentially hundreds of millions of users. However, the adoption of these...

    Provided By Queensland Treasury Corporation

  • White Papers // Aug 2012

    Fully Private Revocable Predicate Encryption

    The authors introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    Forward-Secure Hierarchical Predicate Encryption

    Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. Forward Security (FS), introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    Current Research in Risk-Aware Business Process Management - Overview, Comparison, and Gap Analysis

    The management of risks in business processes has been a subject of active research in the past few years. Many benefits can potentially be obtained by integrating the two traditionally-separated fields of risk management and business process management, including the ability to minimize risks in business processes (by design) and...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    A Formative Measurement Model of Business Process Model Quality

    Business Process Management (BPM) is becoming the dominant management paradigm. Business process modeling is central to BPM, and the resultant business process model the core artefact guiding subsequent process change. Thus, model quality is at the centre, mediating between the modeling effort and related growing investment in ultimate process improvements....

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    Small And Medium Enterprises Sourcing Software As A Service - A Dynamic Perspective On Is Capabilities

    Software as a Service (SaaS) is a promising approach for Small and Medium Enterprises (SMEs) firms, in particular those that are focused on growing fast and leveraging new technology, due to the potential benefits arising from its inherent scalability, reduced total cost of ownership and the ease of access to...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2012

    Automated Risk Mitigation in Business Processes

    In this paper the authors propose a concrete approach for the automatic mitigation of risks that are detected during process enactment. Given a process model exposed to risks, e.g. a financial process exposed to the risk of approval fraud, the authors enact this process and as soon as the likelihood...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2012

    Users' Adoption of Web 2.0 for Knowledge Management: Position Paper

    Web 2.0 is a new generation of online applications on the web that permit people to collaborate and share information online. The use of such applications by employees in organizations enhances Knowledge Management (KM) in organizations. Employee involvement is a critical success factor as the concept is based on openness,...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2012

    Publicly Verifiable Ciphertexts

    In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gate-way that bridges the two domains and faithfully forwards the incoming traffic to the receiver. The authors observe that INDistinguishability against (adaptive) Chosen-Ciphertext Attacks (IND-CCA), which is a mandatory goal...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2012

    Business Process Data Compliance

    Most approaches to business process compliance are restricted to the analysis of the structure of processes. It has been argued that full regulatory compliance requires information on not only the structure of processes but also on what the tasks in a process do. To this end Governatori and Saqid proposed...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2012

    Knowledge-Intensive Business Processes

    Contemporary information systems are generally built on the principle of segregation of data and processes. Data are modeled in terms of entities and relationships while processes are modeled as chains of events and activities. This situation engenders an impedance mismatch between the process layer, the business logic layer and the...

    Provided By Queensland Treasury Corporation

  • White Papers // Mar 2012

    Ergodic Capacity of the Exponentially Correlated Slotted Amplify and Forward Relay Channel

    In this paper, the authors analyze the performance degradation of slotted amplify-and-forward protocol in wireless environments with high node density where the number of relays grows asymptotically large. Channel gains between source-destination pairs in such networks can no longer be independent. They analyze the degradation of performance in such wireless...

    Provided By Queensland Treasury Corporation

  • White Papers // Mar 2012

    How Do Practitioners Use Conceptual Modelling in Practice?

    Much research has been devoted over the years to investigating and advancing the techniques and tools used by analysts when they model. As opposed to what academics, software providers and their resellers promote as should be happening, the aim of this paper was to determine whether practitioners still embraced conceptual...

    Provided By Queensland Treasury Corporation

  • White Papers // Jan 2012

    Distributed Process Discovery and Conformance Checking

    Process mining techniques have matured over the last decade and more and more organization started to use this new technology. The two most important types of process mining are process discovery (i.e., learning a process model from example behavior recorded in an event log) and conformance checking (i.e., comparing modeled...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2011

    Enterprise Architecture And The Integration Of Service-Oriented Architecture

    In recent years, Enterprise Architecture (EA) has captured growing attention as a means to systematically consolidate and interrelate diverse business and IT artefacts in order to provide holistic decision support. The recent popularity of a service-orientation has added \"Service\" and related constructs as a new element that requires consideration within...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2011

    Where Do We Find Services in Enterprise Architectures? a Comparative Approach

    In recent years, Enterprise Architecture (EA) has captured growing attention as a means to systematically consolidate and interrelate diverse IT artifacts in order to provide holistic decision support. Since the emergence of Service-Oriented Architecture (SOA), many attempts have been made to incorporate SOA artifacts in existing EA frameworks. Yet the...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2011

    Towards an Orchestration Theory in Business Transformation Management

    Business transformations are large-scale organizational change projects that, evidence suggests, are often unsuccessful. This study aims to develop a conceptual model that explains how management services that are required for a business transformation are orchestrated during such a initiative. The authors classify management services such as (but not limited to)...

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2011

    Factors of Process Model Comprehension - Findings from a Series of Experiments

    In order to make good decisions about the design of information systems, an essential skill is to understand process models of the business domain the system is intended to support. Yet, little knowledge to date has been established about the factors that affect how model users comprehend the content of...

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2011

    Energy-Oriented Design Tools for Collaboration in the Cloud

    Emerging from the challenge to reduce energy consumption in buildings is the need for energy simulation to be used more effectively to support integrated decision making in early design. As a critical response to a Green Star case study, the authors present DEEPA, a parametric modeling framework that enables architects...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2011

    The Scalability and the Strategy for EMR Database Encryption Techniques

    EMR (Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One of methodology to link non-IT and IT area is to construct databases. Now-a-days, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial...

    Provided By Queensland Treasury Corporation

  • White Papers // Aug 2011

    Workflow Support for Scheduling in Surgical Care Processes

    Real-world business processes rely on the availability of scarce, shared resources, both human and non-human. Current workflow management systems support allocation of individual human resources to tasks but lack support for the full range of resource types used in practice, and the inevitable constraints on their availability and applicability. Based...

    Provided By Queensland Treasury Corporation

  • White Papers // Mar 2014

    Challenges of Knowledge Integration in Small and Medium Enterprises

    In this paper, the authors attempt to develop a better understanding of the challenges of Knowledge Integration (KI) within the innovation process in Small and Medium Enterprises (SMEs). Using several case studies, this study investigates how knowledge integration may be managed within the context of innovation in SMEs. The paper...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2013

    Profiling Event Logs to Configure Risk Indicators for Process Delays

    Risk identification is one of the most challenging stages in the risk management process. Conventional risk management approaches provide little guidance and companies often rely on the knowledge of experts for risk identification. In this paper, the authors demonstrate how risk indicators can be used to predict process delays via...

    Provided By Queensland Treasury Corporation

  • White Papers // Jan 2014

    Intelligent Data Analysis: Issues and Challenges

    Today with the advances of technology, mountainous amounts of data are now available in science, business, industry and many other areas. Evaluation of these collected data may lead to the discovery of trends and patterns hidden within the data that increase the working efficiency and improve the quality of decision...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2013

    Multi-Ciphersuite Security and the SSH Protocol

    Real-world cryptographic protocols, such as the Transport Layer Security (TLS) and Secure SHell (SSH) protocols, support the negotiation of different combinations of cryptographic algorithms, often known as cipher-suites. An individual cipher-suite can be modeled as an Authenticated and Confidential Channel Establishment (ACCE) protocol, and recently all widely deployed TLS cipher-suites...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2013

    Double-Authentication-Preventing Signatures

    The digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, the certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2008

    Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols

    A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-Party Key Exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of Group Key Exchange (GKE) protocols has not been as extensive...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2008

    An Update on the Analysis and Design of NMAC and HMAC Functions

    In this paper, the authors investigate the issues in the analysis and design of provably secure Message Authentication Codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by Bellare, Canetti and Krawczyk. First, they provide security analysis of NMAC using weaker assumptions than stated in its proof of...

    Provided By Queensland Treasury Corporation

  • White Papers // Feb 2013

    State Convergence in Bit-Based Stream Ciphers

    Modern stream cipher applications use a secret key and a publicly known Initialisation Vector (IV) to form an initial internal state for the key-stream generator, before key-stream generation begins. Well-designed initialization and key-stream generation processes for stream ciphers should ensure that each key-IV pair generates a distinct key-stream. In this...

    Provided By Queensland Treasury Corporation

  • White Papers // Jan 2008

    Influence Factors of Understanding Business Process Models

    The increasing utilization of business process models both in business analysis and information systems development raises several issues regarding quality measures. In this context, this paper discusses understandability as a particular quality aspect and its connection with personal, model, and content related factors. The authors use an online survey to...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2009

    From Business Process Models to Process-Oriented Software Systems

    Several methods for enterprise systems analysis rely on flow-oriented representations of business operations, otherwise known as business process models. The Business Process Modeling Notation (BPMN) is a standard for capturing such models. BPMN models facilitate communication between domain experts and analysts and provide input to software development projects. Meanwhile, there...

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2010

    QoS-Oriented Resource Allocation and Scheduling of Multiple Composite Web Services in a Hybrid Cloud Using a Random-Key Genetic Algorithm

    In cloud computing resource allocation and scheduling of multiple composite web services is an important challenge. This is especially so in a hybrid cloud where there may be some free resources available from private clouds but some fee-paying resources from public clouds. Meeting this challenge involves two classical computational problems....

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2010

    A Cooperative Coevolutionary Algorithm for the Composite SaaS Placement Problem in the Cloud

    Cloud computing has become a main medium for Software as a Service (SaaS) hosting as it can provide the scalability a SaaS requires. One of the challenges in hosting the SaaS is the placement process where the placement has to consider SaaS interactions between its components and SaaS interactions with...

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2011

    Energy-Oriented Design Tools for Collaboration in the Cloud

    Emerging from the challenge to reduce energy consumption in buildings is the need for energy simulation to be used more effectively to support integrated decision making in early design. As a critical response to a Green Star case study, the authors present DEEPA, a parametric modeling framework that enables architects...

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2012

    Public, Private, or Hybrid? What the Upstream Oil & Gas Industry Can Learn From Other Sectors About \"The Cloud\"

    Despite the compelling case for moving towards cloud computing, the upstream oil & gas industry faces several technical challenges - most notably, a pronounced emphasis on data security, a reliance on extremely large data sets, and significant legacy investments in Information Technology (IT) infrastructure - that make a full migration...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2012

    Knowledge-Intensive Business Processes

    Contemporary information systems are generally built on the principle of segregation of data and processes. Data are modeled in terms of entities and relationships while processes are modeled as chains of events and activities. This situation engenders an impedance mismatch between the process layer, the business logic layer and the...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2011

    The Scalability and the Strategy for EMR Database Encryption Techniques

    EMR (Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One of methodology to link non-IT and IT area is to construct databases. Now-a-days, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial...

    Provided By Queensland Treasury Corporation

  • White Papers // Sep 2010

    A Rights Management Approach to Securing Data Distribution in Coalitions

    As network capacity has increased over the past decade, individuals and organizations have found it increasingly appealing to make use of remote services in the form of service-oriented architectures and cloud computing services. Data processed by remote services, however, is no longer under the direct control of the individual or...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2011

    A Comparative Analysis of Business Analysis (BA) and Business Process Management (BPM) Capabilities

    Many initiatives to improve Business processes are emerging. The essential roles and contributions of Business Analyst (BA) and Business Process Management (BPM) professionals to such initiatives have been recognized in literature and practice. The roles and responsibilities of a BA or BPM practitioner typically require different skill-sets; however these differences...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2011

    Call for Action: Investigating the Role of Business Process Management in Green IS

    Sustainable practices are more than ever on the radar screen of organizations, triggered by a growing demand of the wider population towards approaches and practices that can be considered \"Green\" or \"Sustainable\". The authors specific intent with this call for action is to immerse deeper into the role of business...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2006

    What Do They Think and Feel About Growth? an Expectancy-Value Approach to Small Business Managers' Attitudes Toward Growth

    In this paper, the authors investigate how small business managers' beliefs concerning the consequences of growth influence their overall growth attitude. They find this to be an important question. Although previous paper has shown that small firm growth is the most important source of new jobs (Davidsson, Lindmark, & Olofsson,...

    Provided By Queensland Treasury Corporation

  • White Papers // Apr 2013

    What Is the Role of Design-Led Innovation and Design-Led Prototyping in Developing Novel Business Models?

    Recently, 'Business model' and 'Business model innovation' have gained substantial attention in management literature and practice. However, many firms lack the capability to develop a novel business model to capture the value from new technologies. Existing literature on business model innovation highlights the central role of 'Customer value'. Further, it...

    Provided By Queensland Treasury Corporation

  • White Papers // Sep 2009

    Controlled Flexibility and Lifecycle Management of Business Processes Through Extensibility

    Vendors provide reference process models as consolidated, off-the shelf solutions to capture best practices in a given industry domain. Customers can then adapt these models to suit their specific requirements. Traditional process flexibility approaches facilitate this operation, but do not fully address it as they do not sufficiently take controlled...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2013

    Slice, Mine and Dice: Complexity-Aware Automated Discovery of Business Process Models

    Automated process discovery techniques aim at extracting models from information system logs in order to shed light into the business processes supported by these systems. Existing techniques in this space are effective when applied to relatively small or regular logs, but otherwise generate large and spaghetti-like models. In previous paper,...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2007

    Context-aware Process Design: Exploring the Extrinsic Drivers for Process Flexibility

    Research on process flexibility has traditionally explored alternative ways of considering flexibility during the design of a business process. The focus typically has been on ways of how the demand for process flexibility can be satisfied by advanced process modeling techniques, i.e., issues intrinsic to the process. This paper proposes...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2008

    Towards a Classification and Lifecycle of Business Process Change

    Business processes in dynamic environments are often subject to disruptions, forcing organizations to change their processes. This gives rise to the question how and when such process change should be considered during the process lifecycle and how it could be anticipated in order to decrease response time. In line with...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2008

    How Does Creativity Impact Business Processes?

    Business processes that involve creativity differ from conventional business processes in many respects: they have a low level of repeatability, typically are high value-add processes, are knowledge-intensive, involve creative persons, have a high demand for flexibility and are characterized by particular (creative) risks. Consequently, for the IS discipline there arise...

    Provided By Queensland Treasury Corporation

  • White Papers // Oct 2012

    A Business Model for an Inclusive Entrepreneurial Development

    In 2004 Prahalad made managers aware of the great economic opportunity that the population at the BoP (Base of the Pyramid) represents for business in the form of new potential consumers. However, MNCs (Multi-National Corporations) generally continue to penetrate low income markets with the same strategies used at the top...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2010

    Co-Creation in Business Service Lifecycle Management

    Co-creation between customers and providers has recently gained more attention by business service providers as a promising endeavour. The different perspectives of co-creation - innovation, sourcing and marketing - are well deployed. From a provider's point of view, the question of how to manage business services with respect to co-creation...

    Provided By Queensland Treasury Corporation

  • White Papers // Aug 2008

    Major Issues in Business Process Management: An Expert Perspective

    Process is perennial. Within any business activity or enterprise it is crucial that the variable of \"Operational efficiency\" is maintained at sufficiently high levels, such that the return on investment is sustainable enough to justify its continued existence. Business Process Management (BPM) is the term used to encapsulate a process-driven...

    Provided By Queensland Treasury Corporation

  • White Papers // May 2010

    Business Service Management : Service and Service Quality

    Managing service quality is of primary importance for organizations that are increasingly service oriented, and offering a growing range of services to external and internal customers. Managing service quality requires the capacity to measure service quality, concomitantly requiring explicit conceptions of 'Service' and 'Service quality'. This paper explores three keys...

    Provided By Queensland Treasury Corporation

  • White Papers // Aug 2009

    Succession Management as a Knowledge Management Strategy

    One of the most critical issues for building innovation capacity in organizations is the acquisition and maintenance of knowledge. As knowledge is the basis of human capital, then the ability to attract, retain and engage talent is argued to be an important element of innovation. By attracting and retaining good...

    Provided By Queensland Treasury Corporation

  • White Papers // Mar 2013

    Which Cultural Values Matter to Business Process Management? Results From a Global Delphi Study

    Business Process Management (BPM) requires a holistic perspective that includes managing the culture of an organization to achieve objectives of efficient and effective business processes. Still, the specifics of a BPM-supportive organizational culture have not been examined so far. Thus, the purpose of the authors' paper is to identify the...

    Provided By Queensland Treasury Corporation

  • White Papers // Sep 2009

    Business and Software Service Lifecycle Management

    Although the service-oriented paradigm has been well established in the technical domain for quite some time now, service governance is still considered a research gap. To ensure adequate governance, there is a necessity to manage services as first-class assets throughout the lifecycle. Now that the concept of service-orientation is also...

    Provided By Queensland Treasury Corporation

  • White Papers // Feb 2013

    Operational Semantics of Aspects in Business Process Management

    Aspect orientation is an important approach to address complexity of cross-cutting concerns in Information Systems. This approach encapsulates these concerns separately and composes them to the main module when needed. Although there are different works which shows how this separation should be performed in process models, the com-position of them...

    Provided By Queensland Treasury Corporation

  • White Papers // Dec 2011

    Towards an Orchestration Theory in Business Transformation Management

    Business transformations are large-scale organizational change projects that, evidence suggests, are often unsuccessful. This study aims to develop a conceptual model that explains how management services that are required for a business transformation are orchestrated during such a initiative. The authors classify management services such as (but not limited to)...

    Provided By Queensland Treasury Corporation

  • White Papers // Nov 2006

    An Operationalization of Stevenson's Conceptualization of Entrepreneurship as Opportunity-Based Firm Behavior

    Stevenson (1983) holds that entrepreneurial management, defined as a set of opportunity-based management practices, can help firms remain vital and contribute to firm and societal level value creation. While his conceptualization has received much attention, little progress has been made because of a lack of empirical tools to examine his...

    Provided By Queensland Treasury Corporation

  • White Papers // Aug 2008

    Enhancing Best Practice in Public Health: Using Process Patterns for Business Process Management

    Business Process Management (BPM) is often perceived as a top priority concern in organizations? both in public and private sectors. Process modeling is an embedded component of most BPM initiatives, yet a resource intensive task. How process models can be derived efficiently (i.e. with less resources and time) and effectively...

    Provided By Queensland Treasury Corporation

  • White Papers // Jun 2009

    Using Grounded Theory for Studying Business Process Management Phenomena

    Grounded theory has emerged as a promising research approach for generating theory in emerging and relevant domains of IS research. In this paper the authors advance the use of grounded theory in one important and under-researched IS domain, business process management, which is characterized by an abundance of conceptual work...

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2006

    Understanding Context-Awareness in Business Process Design

    In recent years, flexibility has emerged as an important guiding principle in the design of business processes. However, research on process flexibility has traditionally been solely focused on ways of how the demand for process flexibility can be satisfied by advanced process modeling techniques, i.e., issues intrinsic to the process....

    Provided By Queensland Treasury Corporation

  • White Papers // Jul 2006

    Business Process Modeling: A Maturing Discipline?

    A plethora of Business Process Modeling techniques has been proposed over the last decades, creating a demand for theory to assist in the comparison and evaluation of these techniques. A widely established way of determining the effectiveness and efficiency of modeling techniques is by way of representational analysis. The purpose...

    Provided By Queensland Treasury Corporation