Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Despite the increasing maturity of contemporary Workflow Management Systems (WfMS), there still exist numerous process-aware application systems with more or less hard-coded proce...
Abstract. Current e-business technology enables the execution of increasingly complex coordination processes that link IT services of different companies. Successful design of cros...
Roel Wieringa, Vincent Pijpers, Lianne Bodenstaff,...
In a B2B environment business partners interact with each other by exchanging electronic business documents. The agreements and commitments between the partner require a certain o...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
The Internet and the proliferation of inexpensive computing power in the form of clusters of workstations or PCs provide the basic hardware infrastructure for business to business...