About
68
Publications
24,536
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
349
Citations
Introduction
Skills and Expertise
Additional affiliations
July 2015 - November 2016
November 2010 - January 2015
Publications
Publications (68)
The digital shift in society is making continuous growth of data. However, choosing a suitable storage architecture to efficiently store, process, and manage data from numerous sources remains a challenge. Currently, there are three storage architecture generations in practice, and the most recent one is Data Lakehouse. Given its novelty, limited r...
This handbook is currently in development, with individual articles publishing online in advance of print publication. At this time, we cannot add information about unpublished articles in this handbook, however the table of contents will continue to grow as additional articles pass through the review process and are added to the site. Please note...
The outflow of manufactured organic products needs to prevent damage to the goods. There are specifications of models of value networks with blockchain services for monitoring transactions. This paper general objective is to provide strategic models to monitor supply chains of organic beverages. The design of this network was based on the Design Sc...
Healthcare processes frequently deviate from established treatment protocols due to unforeseen events and the complexities of illnesses. Many healthcare procedures do not account for variations in treatment paths across different diseases and patient subpopulations. Understanding the similarities and differences in treatment paths for different pat...
Legal ontologies are used to support structuring concepts and relationships in the legal domain. In this study, we focus on the Sri Lankan Civil Appellate High Court (CAHC) domain and investigate the problem of managing the domain knowledge by building a domain ontology. To answer this problem, in this paper, we propose ontology to represent legal...
This poster features research related to process mining in logistics. It is part of the Conversation Pieces series created by researcher Sebastian Piest and cartoonist LUVANE, that focuses on applications and future directions of Intelligence Amplification (IA).
This poster features research related to logistics data spaces. It is part of the Conversation Pieces series created by researcher Sebastian Piest and cartoonist LUVANE, that focuses on applications and future directions of Intelligence Amplification (IA).
Process mining techniques use event logs to discover process models, check conformance, and aid business analysts in improving business processes. A proper interplay between the complexity of discovered process models and the expertise of human interpreters, such as stakeholders, domain experts, and process analysts, is key for the success of proce...
Bottlenecks arise in many processes, often negatively impacting performance. Process mining can facilitate bottleneck analysis, but research has primarily focused on bottleneck detection and resolution, with limited attention given to the prediction of bottlenecks and recommendations for improving process performance. As a result, operational suppo...
Industry 4.0 refers to the digital transformation in the manufacturing domain through new technology. Currently, it expands well beyond manufacturing, affecting many areas of life and posing implications for all types of business. This paper focuses on the relationships between Industry 4.0 and Healthcare which transitions to increased interconnect...
As the potential benefits of implementing International Data Spaces (IDS) become more evident, several initiatives attempt to implement logistics use cases and search alignment with federated IDS infrastructures. This discussion paper provides an overview of completed and current research endeavors in the Dutch logistics industry and searches align...
Process mining derives knowledge of the execution of processes through analyzing behavior as observed from real-life events. While benefits of process mining are widely acknowledged, finding an adequate level of detail at which a mined process model is suitable for a specific stakeholder is still an ongoing challenge. Process models can be mined at...
Presentation to support the discussion paper: Aligning Dutch logistics data spaces initiatives to the international data spaces: Discussing the state of development.
As the potential benefits of implem enting International Data Spaces (IDS) become more evident, several initiatives attempt to implement Logistics Data Spaces (LDS) and search alignment with federated IDS infrastructures. More specifically, the Topsector Logistics Action Agenda (2021-2023) proposed a research and development roadmap outlining the d...
Explainable Machine Learning comprises methods and techniques that enable users to better understand the machine learning functioning and results. This work proposes an ontology that represents explainable machine learning experiments, allowing data scientists and developers to have a holistic view, a better understanding of the explainable machine...
Healthcare providers are legally bound to ensure the privacy preservation of healthcare metadata. Usually, privacy concerning research focuses on providing technical and inter-/intra-organizational solutions in a fragmented manner. In this wake, an overarching evaluation of the fundamental (technical, organizational, and third-party) privacy-preser...
Non-functional requirements (NFRs) are often addressed late in a project and, in turn, can get less attention in the requirements prioritization (RP) process. For various reasons, RP may happen based on functional requirements (FRs) only. While many approaches for prioritizing NFRs have been published, these are known also for some limitations, e.g...
When aggregating logistic event data from different supply chain actors and information systems for process mining, interoperability, data loss, and data quality are common challenges. This position paper proposes and evaluates the use of the Open Trip Model (OTM) for process mining. Inspired by the current industrial use of the OTM for reporting a...
Chatbots answer customer questions by mostly manually crafted Question Answer (Q.A.)-pairs. If organizations process vast numbers of questions, manual Q.A. pair generation and maintenance become very ex-pensive and complicated. To reduce cost and increase efficiency, in this study, we propose a low threshold QA-pair generation system that can autom...
Processes in organisations, such as hospitals, may deviate from the intended standard processes, due to unforeseeable events and the complexity of the organisation. For hospitals, the knowledge of actual patient streams for patient populations (e.g., severe or non-severe cases) is important for quality control and improvement. Process discovery fro...
This report concerns a white paper on the demonstration of practically-oriented guidelines for process mining users. The main target group of this document is novice process mining users (e.g., those who are willing to start using process mining). After proposing the guideline, we present a few exercise questions.
Enterprises have been challenged to adopt practices of sustainability to benefit shareholders and society with goods standing much beyond monetary profit or required by law. In combination with environmental and economic concerns, Corporate Social Responsibility (CSR) has become an option to leverage businesses with good reputation and to attract s...
[Context and Motivation] Many requirements prioritization approaches have been proposed, however not all of them have been investigated empirically in real-life settings. As a result, our knowledge of their applicability and actual use is incomplete. [Question/problem] A 2007 systematic review on requirements prioritization mapped out the landscape...
The main purpose of a value network model is to prospect the sustainability of business strategies. However, much attention has been paid on the economic issues of value modeling, leaving critical environmental and social issues uncovered. On the environmental scope, this study proposes an ontology for modeling value networks to match Green Computi...
Enterprises have been challenged to adopt practices of sustainability to benefit shareholders and society with goods standing much beyond monetary profit or required by law. In combination with environmental and economic concerns, Corporate Social Responsibility (CSR) has become an option to leverage businesses with good reputation and to attract s...
The main purpose of a value network model is to prospect the sustainability of business strategies. However, much attention has been paid on the economic issues of value modeling, leaving critical environmental and social issues uncovered. On the environmental scope, this study proposes an ontology for modeling value networks to match Green Computi...
Information systems leave a traceable digital footprint whenever an action is executed. Business process modelers capture these digital traces to understand the behavior of a system, and to extract actual run-time models of those business processes. Despite the omnipresence of such traces, most organizations face substantial differences between the...
After a large incident on a telecommunications network, the operator typically executes an incident analysis to prevent future incidents. Research suggests that these analyses are done ad hoc, without a structured approach. In this paper, we conduct an investigation of a large incident according to the AcciMap method. We find that this method can b...
Processes in organisations such as hospitals, may deviate from intended standard processes, due to unforeseeable events and the complexity of the organisation. For hospitals, the knowledge of actual patient streams for patient populations (e.g., severe or non-severe cases) is important for quality control and improvement. Process discovery from eve...
The need for continuous improvement of business process drives the adoption of analytics tools and techniques that provide insight into business. One of the techniques that can explore an entity's business process is Process mining. Process mining approach consists of numerous alternatives depending on their tools, types and perspectives. To better...
Process mining is a technique that deals with the extraction of knowledge and data from event logs. One important aspect of process mining is compliance checking. Compliance Checking is a process where the behaviour of process models is compared to the event logs of said process. This paper aims to identify and characterize the different types of a...
After a risk has manifested itself and has led to an accident, valuable lessons can be learned to reduce the risk of a similar accident occurring again. This calls for accident analysis methods. In the past 20 years, a large number of accident analysis methods have been proposed and it is difficult to find the right method to apply in a specific ci...
Monetary profitability is an objective value essential to the sustainability of a value network. The analysis of this requirement continues to receive substantial attention by the e 3 value research community thus far. However, subjective values such as privacy, security and trust might also play a key role on the configuration of a value network,...
Monetary profitability is an objective value essential to the sustainability of a value network. The analysis of this requirement continues to receive substantial attention by the e 3 value research community thus far. However, subjective values such as privacy, security and trust might also play a key role on the configuration of a value network,...
Value network models represent an arrangement of actors, activities and objects of business value configured to satisfy a market segment’s need. As some actors might act unreliably due to unpredicted weaknesses, opportunism that threat value co-creation, monitoring becomes an issue necessary for designing a realistic value model. The research quest...
As part of our co-operation with the Telecommunication Agency of the Netherlands, we want to formulate an accident analysis method and model for use in incidents in telecommunications that cause service unavailability. In order to not re-invent the wheel, we wanted to first get an overview of all existing accident analysis methods and models to see...
The telecommunications marketplace is changing rapidly and telecommunication industry must remain responsive in order to keep up. With that in mind we have looked into the one of the biggest challenges facing by Pakistan Telecommunication Limited. In this paper we have proposed an intelligent architecture for interconnect settlement problem in Paki...
E-commerce ideas demand validation regarding their economic effectiveness on businesses. For identifying relevant business values, some value modeling techniques are currently available in the research arena, and the e3value framework is an easy-to-use option. This framework has a notation to express different values in e-business scenarios. For mo...
The big question of how to successfully complete the project with its constraints always exist with every project. Some set of rules and patterns are needed for project management. Project management strategies provide us set of standards and rules to successfully complete the project and project management viewpoints are one of them. In this paper...
Value constellations are business ecosystems, where multiple actors communicate in economic, legal, information and social affairs. How to monitor such a system demands viewpoint and view-dependent strategies. The problem treated and reported here is how to monitor a value activity. The mechanism proposed to address this problem, so-called Value Ac...
While risk regulations and compliance requirements grow, the capacity of governmental controls only shrinks in many countries. Automation provides a partial solution to this problem, but more is expected from new modes of supervision. The reliability of the provided data becomes essential then. Reliability can be supported by auditing services. At...
Compliance has become a strategic concern for many companies and organizations. To prove actual compliance, the organization must disclose itself (be auditable). A plethora of advanced tools has been developed to support compliance management and auditing processes. However, not all organizations are the same. To apply these tools effectively and e...
Organization's concerns as controlling costs, improving quality, increasing effectiveness, and managing risk increasingly impose strong requirements on Business-IT alignment (B-ITa). Several Maturity Models came into being for considering improvement actions in B-ITa. The IT-Enabled Collaborative Network organizations (ICoNOs) maturity model specif...
From a labour-intensive and paper-based door-keeping function Customs control is aiming now towards international trade facilitation in a way that is both efficient and secure. Digitalization of documents and automation of processes plays an important role in this transition. However, the use of modern technology, in particular SOA, is not yet opti...
In international trade, reliability, security and cost effective logistic chain management are very important challenges that can only be met by innovative usages of IT. The Extended Single Window project aims at a drastic reduction of physical inspections of goods in main ports by coordinated planning of government authorities, reliable transport...
Whereas e-government used to be focused mainly on digitalizing documents, the attention is currently shifting to the question how the main governmental functions service, care and control can be realized in the best way in an information age. In this respect, e-customs is a case in point. Worldwide Customs is transforming from the labor intensive p...
In international trade, reliability, security and cost effective logistic chain management are very important challenges that can only be met by innovative usages of IT. The Extended Single Window(ESW) project aims at a drastic reduction of physical inspections of goods in main ports by coordinated planning of government authorities, reliable trans...