Combining BPM and social software: contradiction or chance?

S Erol, M Granitzer, S Happ, S Jantunen… - Journal of software …, 2010 - Wiley Online Library
Social software has received much attention in the academia and industry due to many
success stories. However, although social software is used widely for business support, its …

Human-oriented challenges of social BPM: an overview

N Pflanzl, G Vossen - … and Information Systems Architectures (EMISA 2013), 2013 - dl.gi.de
Social BPM is the practice of actively involving all relevant stakeholders into BPM through
the use of social software and its underlying principles. This allows enhancing the …

Challenges of social business process management

N Pflanzl, G Vossen - 2014 47th Hawaii International …, 2014 - ieeexplore.ieee.org
Social BPM is the practice of actively involving all relevant stakeholders into a BPM
endeavor through the use of social software and its underlying principles. This allows …

Applying social technology to business process lifecycle management

P Mathiesen, J Watson, W Bandara… - … Workshops: BPM 2011 …, 2012 - Springer
In recent years social technologies such as wikis, blogs or microblogging have seen an
exponential growth in the uptake of their user base making this type of technology one of the …

Partial identities as a foundation for trust and reputation

JM Such, A Espinosa, A Garcia-Fornes… - Engineering Applications of …, 2011 - Elsevier
This paper explores the relationships between the hard security concepts of identity and
privacy on the one hand, and the soft security concepts of trust and reputation on the other …

Towards a game theoretical model for identity validation in social network sites

AC Squicciarini, C Griffin… - 2011 IEEE Third …, 2011 - ieeexplore.ieee.org
Social sites frequently ask for rich sets of user identity properties before granting access.
Users are given the freedom to fail to respond to some of these requests, or can choose to …

Micro workflow gestural analysis: Representation in social business processes

B Jennings, A Finkelstein - … Workshops, Ulm, Germany, September 7, 2009 …, 2010 - Springer
Enterprises are finding limitations with current modelling and hierarchical methodologies
which have human agents as a key component. By requiring a priori knowledge of both …

[LLIBRE][B] Bussines Process Management, Konsep dan Implementasi

ER Mahendrawathi - 2024 - books.google.com
Business Process Management (BPM) merupakan salah satu konsep dan praktek yang
telah mendapatkan perhatian dari para praktisi maupun akademisi di dunia. Namun, masih …

Ontology Extraction of Digital Identity based on Domain Analysis

J Taghizadeh Naeeni, F Fahimnia… - Iranian Journal of …, 2019 - jipm.irandoc.ac.ir
Digital identity has become a significant paradigm in variety of fields such as, sociology,
psychology, social studies, information science and software engineering. Digital identity, as …

Reputation rating modeling for open environment lack of communication by using online social cognition

L Jiang, L Ding, J Liu, J Chen - Journal of Network and Computer …, 2012 - Elsevier
This paper defines the available reputation rating models at present from the viewpoint of set
theory. Furthermore, to solve the problem that present reputation models fail in the condition …