Human Interactions
Abstract
HUMAN INTERACTION:
THE MISSING LINK IN BUSINESS PROCESS MANAGEMENT
There's a new breed of competitor on the block. In todays uncertain global business world, these fierce new competitors are dominating industries by leveraging the universal connectivity of the Internet with a new category of business technology, Business Process Management (BPM). But the BPM techniques currently available are suitable primarily for activities carried out by machines. What about the many processes centered on the very foundation of commercial successhuman-driven processes?
After all processes don't do work, people do. Indeed, technology support for human interactions is the missing link in today's BPM systems. Even the early process-based competitors are eager to reinvigorate human-centered work processes, for they know that these are the heart and soul of performance improvement and innovation.
So, what is work? What does an information worker actually do all day? Read and write emails, create documents, make phone calls, attend meetings, talk to people, research, think, decide, agree, reject, ... this is the process of work; its how real work works. But because little of real work is augmented by modern computer systems, how can it be properly managed for greater effectiveness? The solution is not to try and find systems that replace humans - to automate people out of the picture. We are nowhere near the (perhaps mythical) stage at which humans have become irrelevant to the daily functioning of the enterprise. To the contrary, we need to make the best use of human skills by facilitating how work actually gets done, by real people. Amplifying the work carried out by people not only benefits the enterprise as a whole, but also improves job satisfaction of the individuals who are its life-blood.
To amplify human-driven processes, we need to first understand how to formally describe such work, and then capture this understanding in a computer system. This calls for a change in kind in both business process modeling, and the BPM systems being proffered by todays IT vendors. This book examines the true nature of work, and shows how it can be supported by the next generation of BPM systems. Drawn directly from first-hand experience, its a practical guide, not an exposition of abstract theory. In this groundbreaking book, a high-level discussion, written for business people, is supplemented with a technology focused discussion for enterprise architects and developers, providing them with detailed guidelines for implementing computer support for human-driven processes.
Business Process Management or BPM, broadly speaking, is part of a tradition that is now several decades old that aims at
improving the way business people think about and manage their businesses. Its particular manifestations, whether they are
termed “Work Simplification,” “Six Sigma,” “Business Process Reengineering,” or “Business Process Management,” may come and
go, but the underlying impulse, to shift the way managers and employees think about the organization of business, will continue
to grow and prosper. This chapter will provide a very broad survey of the business process movement. Anyone who tries to promote
business process change in an actual organization will soon realize that there are many different business process traditions
and that individuals from the different traditions propose different approaches to business process change. If we are to move
beyond a narrow focus on one tradition or technology, we need a comprehensive understanding of where we have been and where
we are today, and we need a vision of how we might move forward. We will begin with a brief overview of the past and of the
three business process traditions that have created the context for today’s interest in BPM. Then we will turn to a brief
survey of some of the major concerns that process practitioners are focused on today and that will probably impact most corporate
BPM efforts in the near future.
Gigantically comprehensive and carefully researched, Security Engineering makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice. Better, Ross Anderson offers a lot of thoughts on how information can be made more secure (though probably not absolutely secure, at least not forever) with the help of both technologies and management strategies. His work makes fascinating reading and will no doubt inspire considerable doubt--fear is probably a better choice of words--in anyone with information to gather, protect, or make decisions about. Be aware: This is absolutely not a book solely about computers, with yet another explanation of Alice and Bob and how they exchange public keys in order to exchange messages in secret. Anderson explores, for example, the ingenious ways in which European truck drivers defeat their vehicles' speed-logging equipment. In another section, he shows how the end of the cold war brought on a decline in defenses against radio-frequency monitoring (radio frequencies can be used to determine, at a distance, what's going on in systems--bank teller machines, say), and how similar technology can be used to reverse-engineer the calculations that go on inside smart cards. In almost 600 pages of riveting detail, Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. A terrific read for security professionals and general readers alike. --David Wall Topics covered: How some people go about protecting valuable things (particularly, but not exclusively, information) and how other people go about getting it anyway. Mostly, this takes the form of essays (about, for example, how the U.S. Air Force keeps its nukes out of the wrong hands) and stories (one of which tells of an art thief who defeated the latest technology by hiding in a closet). Sections deal with technologies, policies, psychology, and legal matters.
A bigraphical reactive system (BRS) involves bigraphs, in which the nesting of nodes represents locality, independently of the edges connecting them; it also allows bigraphs to reconfigure themselves. BRSs aim to provide a uniform way to model spatially distributed systems that both compute and communicate. In this memorandum we develop their static and dynamic theory.
Using a Language Action Framework to Extend Organizational Process Modeling
- See
See, for example, "Using a Language Action Framework to Extend Organizational Process Modeling"
(http://www.cems.uwe.ac.uk/~sjgreen/UKAIS2003.pdf), which shows how
speech acts can be layered on top of Role Activity Diagrams to provide a deeper
understanding of interaction dynamics.
- P Harmon
Harmon, P., 2005, "BPEL and BPM,"
http://www.bptrends.com/deliver_file.cfm?fileType=publication&fileName=bp
temailadvisor012505%2Epdf
90, 140, 145, 224 cultural clashes resolution of
- J . . . . . Coplien
Coplien, J........... 90, 140, 145, 224
cultural clashes
resolution of........................ 210
152 process modelling notations current basis
- Management ............................ . Support
Process Model for Management
Support................................. 152
process modelling notations
current basis......................... 124
process modelling project
estimating............................... 43
processes change processes..... 38,
294
production worker..................... 20
project management
conceptual model for.. 11, 152
GANTT chart..................... 165
PERT chart.......................... 165