Towards Multi-level Organizational Control Framework to Manage the Business Transaction Workarounds
暂无分享,去创建一个
[1] Jan A. P. Hoogervorst,et al. Enterprise Governance and Enterprise Engineering , 2009, The Enterprise Engineering Series.
[2] M. Bosch. Brain Of The Firm The Managerial Cybernetics Of Organization , 2016 .
[3] Ron Weber,et al. On the ontological expressiveness of information systems analysis and design grammars , 1993, Inf. Syst. J..
[4] Joon S. Park,et al. Access control mechanisms for inter-organizational workflow , 2001, SACMAT '01.
[5] Hans B. F. Mulder,et al. The discipline of enterprise engineering , 2013 .
[6] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[7] Marta Indulska,et al. Modeling languages for business processes and business rules: A representational analysis , 2009, Inf. Syst..
[8] Jan L. G. Dietz,et al. Enterprise Architecture in Enterprise Engineering , 2008, Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model..
[9] Wil M. P. van der Aalst,et al. Conformance checking of processes based on monitoring real behavior , 2008, Inf. Syst..
[10] Martin Op't Land,et al. Enterprise Architecture - Creating Value by Informed Governance , 2008, The Enterprise Engineering Series.
[11] José M. Tribolet,et al. Conceptualizing Enterprise Dynamic Systems Control For Run-Time Business Transactions , 2013, ECIS.
[12] Abbas Emami-Naeini,et al. Feedback Control of Dynamic Systems (6th edition) , 2010 .
[13] Jan L. G. Dietz,et al. Enterprise ontology - theory and methodology , 2006 .
[14] Steven L. Alter. Work System Theory: Overview of Core Concepts, Extensions, and Challenges for the Future , 2013, J. Assoc. Inf. Syst..
[15] André Vasconcelos,et al. Enterprise Dynamic Systems Control Enforcement of Run-Time Business Transactions , 2012, EEWC.
[16] Upkar Varshney,et al. Communications of the Association for Information Systems , 2000 .
[17] Robert M. Davison,et al. Sharing Knowledge In Technology Deficient Environments: Individual Workarounds Amid Corporate Restrictions , 2013, ECIS.
[18] Elisa Bertino,et al. The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.
[19] David Simms,et al. The Heart of Enterprise , 1980 .