273
Views
5
CrossRef citations to date
0
Altmetric
Articles

Method towards discovering potential opportunity information during cross-organisational business processes using role identification analysis within complex social network

, , , &
Pages 436-462 | Received 31 Mar 2018, Accepted 18 Dec 2018, Published online: 06 Jan 2019

References

  • Allen, T. J., P. Gloor, A. Fronzetti Colladon, S. L. Woerner, and O. Raz. 2016. “The Power of Reciprocal Knowledge Sharing Relationships for Startup Success.” Journal of Small Business and Enterprise Development 23 (3): 636–651. doi:10.1108/JSBED-08-2015-0110.
  • Alotaibi, Y., and F. Liu. 2017. “Survey of Business Process Management: Challenges and Solutions.” Enterprise Information Systems 11 (8): 1119–1153. doi:10.1080/17517575.2016.1161238.
  • Anagnostopoulos, A., L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi. 2012. “Online Team Formation in Social Networks.” In Proceedings of the 21st international conference on World Wide Web, 839–848. ACM. doi:10.1145/2187836.2187950.
  • Barthelemy, M. 2004. “Betweenness Centrality in Large Complex Networks.” The European Physical Journal B 38 (2): 163–168. doi:10.1140/epjb/e2004-00111-4.
  • Bonchi, F., C. Castillo, A. Gionis, and A. Jaimes. 2011. “Social Network Analysis and Mining for Business Applications.” ACM Transactions on Intelligent Systems and Technology (TIST) 2 (3): 22.
  • Borgatti, S. P., A. Mehra, D. J. Brass, and G. Labianca. 2009. “Network Analysis in the Social Sciences.” Science 323 (5916): 892–895. doi:10.1126/science.1165821.
  • Brandes, U. 2001. “A Faster Algorithm for Betweenness Centrality.” Journal of Mathematical Sociology 25 (2): 163–177. doi:10.1080/0022250X.2001.9990249.
  • Branger, J., and Z. Pang. 2015. “From Automated Home to Sustainable, Healthy and Manufacturing Home: A New Story Enabled by the Internet-of-Things and Industry 4.0.” Journal of Management Analytics 2 (4): 314–332. doi:10.1080/23270012.2015.1115379.
  • Centola, D. 2010. “The Spread of Behavior in an Online Social Network Experiment.” Science 329 (5996): 1194–1197. doi:10.1126/science.1185231.
  • Chen, D., L. Lü, M. S. Shang, Y. C. Zhang, and T. Zhou. 2012. “Identifying Influential Nodes in Complex Networks.” Physica A: Statistical Mechanics and Its Applications 391 (4): 1777–1787. doi:10.1016/j.physa.2011.09.017.
  • Chen, D. B., R. Xiao, A. Zeng, and Y. C. Zhang. 2014. “Path Diversity Improves the Identification of Influential Spreaders.” EPL (Europhysics Letters) 104 (6): 68006. doi:10.1209/0295-5075/104/68006.
  • Chou, B. H., and E. Suzuki. 2010. “Discovering Community-Oriented Roles of Nodes in a Social Network.” In International Conference on Data Warehousing and Knowledge Discovery, 52–64. Berlin, Heidelberg: Springer.
  • Colladon, A. F., and E. Remondi. 2017. “Using Social Network Analysis to Prevent Money Laundering.” Expert Systems with Applications 67: 49–58. doi:10.1016/j.eswa.2016.09.029.
  • Esslimani, I., A. Brun, and A. Boyer. 2010. “Detecting Leaders in Behavioral Networks.” In Advances in Social Networks Analysis and Mining (ASONAM), 281–285. IEEE. doi:10.1109/ASONAM.2010.72.
  • Freeman, L. C. 1979. “Centrality in Social Networks Conceptual Clarification.” Social Networks 1 (3): 215–239. doi:10.1016/0378-8733(78)90021-7.
  • Girvan, M., and M. E. Newman. 2002. “Community Structure in Social and Biological Networks.” Proceedings of the National Academy of Sciences 99 (12): 7821–7826. doi:10.1073/pnas.122653799.
  • Granovetter, M. S. 1977. “The Strength of Weak Ties.” In Social Networks, 347–367. doi:10.1086/225469.
  • Hansen, M. T., M. L. Mors, and B. Løvås. 2005. “Knowledge Sharing in Organizations: Multiple Networks, Multiple Phases.” Academy of Management Journal 48 (5): 776–793. doi:10.5465/amj.2005.18803922.
  • Hills, G. E., G. T. Lumpkin, and R. P. Singh. 1997. “Opportunity Recognition: Perceptions and Behaviors of Entrepreneurs.” Frontiers of Entrepreneurship Research 17 (4): 168–182.
  • Hou, B., Y. Yao, and D. Liao. 2012. “Identifying All-Around Nodes for Spreading Dynamics in Complex Networks.” Physica A: Statistical Mechanics and Its Applications 391 (15): 4012–4017. doi:10.1016/j.physa.2012.02.033.
  • Ibrahim, R., and M. Nissen. 2007. “Discontinuity in Organizations: Developing a Knowledge-Based Organizational Performance Model for Discontinuous Membership.” International Journal of Knowledge Management (IJKM) 3 (1): 10–28. doi:10.4018/IJKM.
  • Jalali, A. 2016. “Reflections on the Use of Chord Diagrams in Social Network Visualization in Process Mining.” In International Conference on Research Challenges in Information Science, 1–6. IEEE. doi:10.1109/RCIS.2016.7549281.
  • Juang, M. C., C. C. Huang, and J. L. Huang. 2013. “Efficient Algorithms for Team Formation with a Leader in Social Networks.” The Journal of Supercomputing 66 (2): 721–737. doi:10.1007/s11227-013-0907-x.
  • Kargar, M., and A. An. 2011. “Discovering Top-K Teams of Experts With/Without a Leader in Social Networks.” In Proceedings of the 20th ACM international conference on Information and knowledge management, 985–994. ACM. doi:10.1145/2063576.2063718.
  • Kharote, M., and V. P. Kshirsagar. 2014. “Data Mining Model for Money Laundering Detection in Financial Domain.” International Journal of Computer Applications 85 (16): 61C64.
  • Kitsak, M., L. K. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. E. Stanley, and H. A. Makse. 2010. “Identification of Influential Spreaders in Complex Networks.” Nature Physics 6 (11): 888. doi:10.1038/nphys1746.
  • Krause, J., D. P. Croft, and R. James. 2007. “Social Network Theory in the Behavioural Sciences: Potential Applications.” Behavioral Ecology and Sociobiology 62 (1): 15–27. doi:10.1007/s00265-007-0445-8.
  • Kuhnert, M. T., C. Geier, C. E. Elger, and K. Lehnertz. 2012. “Identifying Important Nodes in Weighted Functional Brain Networks: A Comparison of Different Centrality Approaches.” Chaos: an Interdisciplinary Journal of Nonlinear Science 22 (2): 023142. doi:10.1063/1.4729185.
  • Leemans, S. J., D. Fahland, and W. M. van der Aalst. 2014. “Process and Deviation Exploration with Inductive Visual Miner.” BPM (Demos) 1295: 46.
  • Lin, S., Z. Luo, Y. Yu, and M. Pan. 2013. “Effective Team Formation in Workflow Process Context.” In Proceedings of the third International Conference on Cloud and Green Computing, 508–513. IEEE. doi:10.1109/CGC.2013.85.
  • Newman, M. E. 2006. “Finding Community Structure in Networks Using the Eigenvectors of Matrices.” Physical Review E 74 (3): 036104. doi:10.1103/PhysRevE.74.036104.
  • Pang Z, Chen Q, Han W, et al. 2015. “Value-Centric Design of the Internet-Of-Things Solution for Food Supply Chain: Value Creation, Sensor Portfolio and Information Fusion.” Information Systems Frontiers 17 (2): 289–319. DOI:10.1007/s10796-012-9374-9.
  • Pang, Z., and J. Tian. 2014. “Ecosystem-Driven Design of In-Home Terminals Based on Open Platform for the Internet-Of-Things.” In Proceedings of International Conference on Advanced Communication Technology, 369–377. IEEE. doi:10.1109/ICACT.2014.6779195.
  • Pang Z, Zheng L, Tian J, et al. 2015. “Design of a Terminal Solution for Integration of In-Home Health Care Devices and Services Towards the Internet-Of-Things.” Enterprise Information Systems 9 (1): 86–116. DOI:10.1080/17517575.2013.776118.
  • Panpanich, P., P. Porouhan, and W. Premchaiswadi. 2015. “Analysis of Handover of Work in Call Center Using Social Network Process Mining Technique.” In ICT and Knowledge Engineering, 97–104. IEEE. doi:10.1109/ICTKE.2015.7368478.
  • Pérez, D. G., and M. M. Lavalle. 2011. “Outlier Detection Applying an Innovative User Transaction Modeling with Automatic Explanation.” In Electronics, Robotics and Automotive Mechanics Conference, 41–46. IEEE. doi:10.1109/CERMA.2011.14.
  • Sen, F., N. Nagisetty, T. Viangteeravat, and N. Agarwal. 2015. “An Online Platform for Focal Structures Analysis-Analyzing Smaller and More Pertinent Groups Using a Web Tool.” In AAAI Spring Symposium Series.
  • Sen, F., R. Wigand, N. Agarwal, S. Tokdemir, and R. Kasprzyk. 2016. “Focal Structures Analysis: Identifying Influential Sets of Individuals in a Social Network.” Social Network Analysis and Mining 6 (1): 17. doi:10.1007/s13278-016-0319-z.
  • Shannon, C. E. 1948. “A Mathematical Theory of Communication.” Bell System Technical Journal 27 (3): 379–423. doi:10.1002/bltj.1948.27.issue-3.
  • Sorkhi, M., and S. Hashemi. 2015. “Effective Team Formation in Collaboration Networks Using Vertex and Proficiency Similarity Measures.” Ai Communications 28 (4): 637–654. doi:10.3233/AIC-140628.
  • Sun, Y., W. Tan, L. Li, W. Shen, Z. Bi, and X. Hu. 2016. “A New Method to Identify Collaborative Partners in Social Service Provider Networks.” Information Systems Frontiers 18 (3): 565–578. doi:10.1007/s10796-015-9547-4.
  • Tan, W., L. Li, W. Xu, F. Yang, C. Jiang, L. Yang, and J. Choi. 2012. “A Role-Oriented Service System Architecture for Enterprise Process Collaboration.” Computers & Operations Research 39 (8): 1893–1900. doi:10.1016/j.cor.2011.07.007.
  • Tan, W., W. Xu, F. Yang, L. Xu, and C. Jiang. 2013. “A Framework for Service Enterprise Workflow Simulation with Multi-Agents Cooperation.” Enterprise Information Systems 7 (4): 523–542. doi:10.1080/17517575.2012.660503.
  • Tan, W., Y. Xu, W. Xu, L. Xu, X. Zhao, L. Wang, and L. Fu. 2010. “A Methodology toward Manufacturing Grid-Based Virtual Enterprise Operation Platform.” Enterprise Information Systems 4 (3): 283–309. doi:10.1080/17517575.2010.504888.
  • Tan, W. A., C. Q. Jiang, L. Li, and Z. Lv. 2008. “Role-Oriented Process-Driven Enterprise Cooperative Work Using the Combined Rule Scheduling Strategies.” Information Systems Frontiers 10 (5): 519–529. doi:10.1007/s10796-008-9107-2.
  • Van der Aalst, W. M. P., H. A. Reijers, and M. Song. 2005. “Discovering Social Networks from Event Logs.” Computer Supported Cooperative Work (CSCW) 14 (6): 549–593. doi:10.1007/s10606-005-9005-9.
  • Van der Aalst, W. M. P., and M. Song. 2004. “Mining Social Networks: Uncovering Interaction Patterns in Business Processes.” In International Conference on Business Process Management 3080: 244–260.
  • Wang, P., C. Tian, and J. A. Lu. 2014. “Identifying Influential Spreaders in Artificial Complex Networks.” Journal of Systems Science and Complexity 27 (4): 650–665. doi:10.1007/s11424-014-2236-4.
  • Wasserman, S., and K. Faust. 1994. Social Network Analysis: Methods and Applications. Cambridge university press. ISBN: 9780521387071.
  • Wolf, T., A. Schröter, D. Damian, L. D. Panjer, and T. H. Nguyen. 2009. “Mining Task-Based Social Networks to Explore Collaboration in Software Teams.” IEEE Software 26 (1): 58–66. doi:10.1109/MS.2009.16.
  • Xu, L., H. Liu, S. Wang, and K. Wang. 2009. “Modeling and Analysis Techniques for Cross-Organizational Workflow Systems.” Systems Research and Behavioral Science 26 (3): 367–389. doi:10.1002/sres.978.
  • Xu, L., W. Tan, H. Zhen, and W. Shen. 2008. “An Approach to Enterprise Process Dynamic Modeling Supporting Enterprise Process Evolution.” Information Systems Frontiers 10 (5): 611–624. doi:10.1007/s10796-008-9114-3.
  • Xu, L., and W. Viriyasitavat. 2014. “A Novel Architecture for Requirement-Oriented Participation Decision in Service Workflows.” IEEE Transactions on Industrial Informatics 10 (2): 1478–1485. doi:10.1109/TII.2014.2301378.
  • Zhu, T., B. Wang, B. Wu, and C. Zhu. 2011. “Role Defining Using Behavior-Based Clustering in Telecommunication Network.” Expert Systems with Applications 38 (4): 3902–3908. doi:10.1016/j.eswa.2010.09.051.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.