Figure 6 - uploaded by Mathias Kirchmer
Content may be subject to copyright.
-Process Impact Assessment Matrix in the BPM-D Application

-Process Impact Assessment Matrix in the BPM-D Application

Source publication
Research
Full-text available
Digitalization has transformed the way organizations operate. New digital tools are available with increasing regularity-and many of them have the potential for a major impact. They enable the transformation of business processes to become more efficient, agile, meet compliance requirements, enhance customer experience or improve the general qualit...

Context in source publication

Context 1
... of this process segmentation is the identification of high impact low maturity processes (Franz, Kirchmer, 2017). An example of such a process impact assessment matrix is shown in figure 6, again using the BPM-D Application. High impacts are denoted using a colour code (red being the highest), and the process maturity is denoted by the blue line beneath, the capability gap is the grey line extending from the blue. ...

Similar publications

Article
Full-text available
Enterprises rely on their process-aware information system (PAIS) to conduct business. Therefore, appropriately responding to environmental changes is vital for enterprises to maintain competitiveness. However, one type of change, namely the long-tailed change (LTC), has been overlooked by traditional business process management practice because of...

Citations

Chapter
Full-text available
In the Modern era, we have witnessed a lot of progress in the world of technology and almost every day we come across a piece of news related to the darker side of technology. There are a number of technical experts who falls into unethical ways of using the internet to do so some fraudulent activities. Hacking is ethical if it is done for the welfare of humanity otherwise it is labelled as a crime. Unethical hackers always try to find out different ways to cheat innocent people who are not that efficient in technology. There are a number of ways that a hacker can use to steal the hard-earned money of innocent people. Azi Bello is the central character of the novel The Gomorrah Gambit by Tom Chatfield. The story reveals how Azi Bello indulged in the dark side of the hacking and ultimately find himself on the list of most wanted criminals. The most pathetic situation becomes when such people enter the category of terrorists and try to cheat their own national security for the sake of money. The purpose of this paper is to highlight such darker aspects of technology through close textual analysis of the novel and by relating the incidents mentioned by the writer with reality. Keywords: Hacking, Human Security, Information Technology (ICT), Azi Bello
Chapter
We are in a particular moment, especially after the last pandemic year, now we have opportunity to understand well what really is the full potential of Robotic Process Automation. The debate on AI is now in a new step: how we can have a value added from the automation? It is necessary to overcome technological and ethical considerations, and to analyze the impacts that RPA can bring to society, especially in correlation with UN Sustainable Goals . It is important to identify what challenges we have to manage now and in the future and what scenario will be open cause our decision, what benefits and adverse effects. It is necessary to analyze the factors that influence the adoption of new automation process in government and how to driven change. We have different interpretations and views on expected outcomes of automation on government tasks, anyway in this analysis I would like to link the RPA with principles like Green Deal . The methodical approach is literature analysis and some global case studies.