Abstract is missing.
- Modeling Change in Business ProcessesChristof Thim, Norbert Gronau, Jennifer Haase, Marcus Grum, Arnulf Schüffler, Wiebke M. Roling, Annette Kluge. 3-17 [doi]
- Realizing Appropriate Process Standardization - Basis for Effective Digital TransformationMathias Kirchmer. 18-31 [doi]
- Serious Game-Based Haptic Modeling - An Application-Oriented Approach for Sequentially Developing New Business Models from Tacit KnowledgeNorbert Gronau, Malte Teichmann, Edzard Weber. 32-55 [doi]
- Enterprise Modeling with ConventionsStef Joosten, Ella E. Roubtsova. 56-73 [doi]
- Business Modeling and (Human) Context AwarenessCoen Suurmond. 74-91 [doi]
- Incorporating Trust into Context-Aware ServicesBoris Shishkov, Hans-Georg Fill, Krassimira Ivanova, Marten van Sinderen, Alexander Verbraeck. 92-109 [doi]
- VR-EvoEA+BP: Using Virtual Reality to Visualize Enterprise Context Dynamics Related to Enterprise Evolution and Business ProcessesRoy Oberhauser, Marie Baehre, Pedro Sousa. 110-128 [doi]
- Past Achievements and Future Opportunities in Combining Conceptual Modeling with VR/AR: A Systematic DerivationFabian Muff, Hans-Georg Fill. 129-144 [doi]
- FaaSOnto: A Semantic Model for Enabling Function-as-a-Service Platform SelectionStijn van Geene, Indika Kumara, Geert Monsieur, Willem-Jan van den Heuvel, Damian Andrew Tamburri. 145-162 [doi]
- Development of a Capability Maturity Model for Organization-Wide Green IT AdoptionVictor Brand, Maryam Razavian, Baris Özkan. 163-179 [doi]
- From Conceptual Specification to OO SpecificationBert de Brock, Rein Smedinga. 180-199 [doi]
- Architecting Agility: Unraveling the Impact of AI Capability on Organizational Change and Competitive AdvantageRogier van de Wetering, Petra C. De Weerd-Nederhof, Samaneh Bagheri, Roger Bons. 203-213 [doi]
- Enterprise Architecture Artifacts' Role in Improved Organizational PerformanceFrank Grave, Rogier van de Wetering, Rob J. Kusters. 214-224 [doi]
- A Semiotic Analysis of the Representativeness of BPMN Graphic ElementsEvelyne Batista Duarte, Rafael Batista Duarte, Denis Silva da Silveira. 225-234 [doi]
- A Systematic Approach to Derive User Stories and Gherkin Scenarios from BPMN ModelsDaniel Mateus, Denis Silva da Silveira, João Araújo 0001. 235-244 [doi]
- Composing an Initial Domain-Specific Modeling Language Notation by Reusing IconsBen Roelens, Rob Ebben, Rogier van de Wetering. 245-255 [doi]
- Validating Trust in Human Decisions to Improve Expert Models Based on Small Data SetsJohan Silvander, Shailesh Pratap Singh. 256-267 [doi]
- How is Affect Social Justice Tensions: A Case Study of Asylum ManagementTamara Roth, Alexander Rieger, Gilbert Fridgen, Amber Grace Young. 268-277 [doi]
- Applying Augmented Reality in Tourism: Analyzing Relevance as It Concerns Consumer Satisfaction and Purchase IntentionFaisal Aburub. 278-288 [doi]
- Comparing Sensor-Based Computing and Predictive Data Analytics for Usage in Context-Aware ApplicationsBoris Shishkov, Georgi Yosifov, Boyan Bontchev. 289-298 [doi]
- A Model of a Multi-sensor System for Detection and Tracking of Vehicles and DronesIvan Garvanov, Magdalena Garvanova, Daniela Borissova, Gabriela Garvanova. 299-307 [doi]
- A Web-Based Approach for Traceability in Rule-Based Business Information SystemsLloyd Rutledge, Brent Berghuis, Kelvin Lim, Mark Soerokromo. 308-318 [doi]
- A Conceptual Model for the Selection of Methods for Software Engineering Process ImprovementTiago Amorim 0001, Andreas Vogelsang. 319-329 [doi]
- Towards Log-Driven Monitoring of Technical Degradation: An ERP PerspectivePieter van de Griend, Rob J. Kusters, Jos J. M. Trienekens. 330-339 [doi]
- A Development Example: From Conceptual Specification to OO SpecificationRein Smedinga, Bert de Brock. 340-351 [doi]
- Managing Database Trigger DesignBert de Brock. 352-364 [doi]
- A View on Vulnerabilities Within IoT Devices in the Smart Home EnvironmentAnnika Nykänen, Andrei Costin. 365-374 [doi]
- On Tools for Practical and Effective Security Policy Management and Vulnerability ScanningIlkka Urtamo, Andrei Costin. 375-382 [doi]
- Linking Computers to the Brain: Overview of Cybersecurity Threats and Possible SolutionsTuomo Lahtinen, Andrei Costin. 383-392 [doi]