- Business Process Modeling and Analysis
- Service-Oriented Architecture and Web Services
- Semantic Web and Ontologies
- Information Technology Governance and Strategy
- Advanced Software Engineering Methodologies
- Software Engineering Research
- Advanced Database Systems and Queries
- Big Data and Business Intelligence
- Service and Product Innovation
- Data Quality and Management
- Software Engineering Techniques and Practices
- ERP Systems Implementation and Impact
- Software System Performance and Reliability
- Model-Driven Software Engineering Techniques
- Web Applications and Data Management
- Advanced Text Analysis Techniques
- Software Reliability and Analysis Research
- Digital Platforms and Economics
- Outsourcing and Supply Chain Management
- Sharing Economy and Platforms
- Business Strategy and Innovation
- Mobile and Web Applications
- Privacy, Security, and Data Protection
- Competitive and Knowledge Intelligence
- Cybercrime and Law Enforcement Studies
Ghent University
2016-2025
Ghent University Hospital
2014-2025
Flanders Make (Belgium)
2022-2025
Vrije Universiteit Amsterdam
2022
TU Wien
2022
Luxembourg Institute of Science and Technology
2022
University of Luxembourg
2022
Instituto Superior Técnico
2022
University of Twente
2022
University of Castilla-La Mancha
2022
Abstract Organisations are increasingly focusing on their business processes (BPs) to excel. Since the journey towards process excellence is challenging, various authors have proposed a maturity model (BPMM) gradually improve and capability. Nonetheless, comprehensive definition for BPMM, capability missing. Moreover, differences between frequently neglected. Therefore, this study elaborates lacking foundation. In particular, thorough literature conducted address three gaps regarding BPMM...
The article elaborates on business process maturity, which indicates how well an organisation can perform based its processes, i.e. way of working. This topic is paramount importance for managers who try to excel in today's competitive world. Hence, maturity emerging research field. However, no consensus exists the capability areas (or skills) needed excel. Moreover, their theoretical foundation and synergies with other fields are frequently neglected. To overcome this gap, our study...
Prior studies have shown that the behaviours and attitudes of Internet users influence likelihood being victimised by phishing attacks. Many scammers design a step-by-step approach to in order gain potential victim's trust convince them take desired actions. It is important understand which can following attacker each step scam. This will enable us identify root causes develop specific mitigation plans for process increase prevention points. study investigates what extent people's...
Maturity models have become important aids to support process improvement. However, researchers frequently criticized the many business maturity (BPMMs) for differing in quality, which creates a demand comparing and evaluating these models. This paper describes well-founded, ranked, weighted set of critical criteria BPMMs that are most prospective users. The also demonstrates how this can serve as standard or guideline designing BPMMs. In used sample against criteria, we reveal gaps...
Phishing is an online scam where criminals trick users with various strategies, the goal of obtaining sensitive information or compromising accounts, systems, and/or other personal organisational Information Technology resources. Multiple studies have shown that human factors influence success phishing attempts. However, these were conducted before COVID-19 pandemic, which significant because security reports show numbers attacks been rapidly increasing since start COVID-19. This study...
User stories are a widely used artifact in Agile software development. Currently, only limited number of secondary studies have reviewed the research on user story technique. These reviews focused specific topics related to ambiguity requirements, effort estimation, and application Natural Language Processing. To our knowledge, systematic mapping <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">all</i> has not been performed. this end, we...
The quality of conceptual models directly affects the understanding application domain and final software products that are ultimately based on them. This paper describes a systematic literature review (SLR) peer-reviewed conference journal articles published from 1997 through 2009 written in UML, undertaken to understand state-of-the-art, then identify any gaps current research. Six digital libraries were searched, 266 papers dealing specifically with UML identified classified into five...
Ontology-driven conceptual modeling (ODCM) is still a relatively new research domain in the field of information systems and there much discussion on how ODCM should be performed what focus this be. Therefore, article aims to critically surve y existing literature order assess kind that has been over years, analyze nature contributions establish its current state art by positioning, evaluating interpreting relevant date related ODCM. To understand identify any gaps opportunities, our study...
<title>Abstract</title> In today’s digital landscape, as big data analytics (BDA) gain increasing significance, it is vital to have robust strategies for safeguarding privacy and protection. This paper focuses on improving protection impact assessments (DPIAs) in the context of BDA, aligning them with principles General Data Protection Regulation (GDPR). Through a study that combines Delphi approach individual expert interviews, we validated nine critical touch points (PTPs) adapting DPIA...
This research note explores the future agenda for Capability-Based Management (CBM) and capability concept, building on discussions from International Workshop Foundations Applications of Capabilities in Enterprises, Transformations, ESG Initiatives (FACETE). The identifies two primary subdomains advancement: establishing a harmonized foundation Capability Map concepts, refining CBM practices. Key topics include developing dynamic, context-aware definitions models; formalizing relationships;...