{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:11:09Z","timestamp":1767064269130},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2008,11,12]],"date-time":"2008-11-12T00:00:00Z","timestamp":1226448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1007\/s10796-008-9145-9","type":"journal-article","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T09:12:35Z","timestamp":1226394755000},"page":"443-455","source":"Crossref","is-referenced-by-count":20,"title":["Increasing the efficiency of business processes using a theory of constraints"],"prefix":"10.1007","volume":"12","author":[{"given":"Seung-Hyun","family":"Rhee","sequence":"first","affiliation":[]},{"given":"Nam Wook","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Hyerim","family":"Bae","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,11,12]]},"reference":[{"key":"9145_CR1","volume-title":"Managing business process flows","author":"R. Anupindi","year":"2006","unstructured":"Anupindi, R., et al. (2006). Managing business process flows (2nd ed.). New Jersey: Prentice Hall.","edition":"2"},{"issue":"7","key":"9145_CR2","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1287\/mnsc.41.7.1250","volume":"41","author":"U. M. Apte","year":"1995","unstructured":"Apte, U. M., & Mason, R. O. (1995). Global disaggregation of information-intensive services. Management Science, 41(7), 1250\u20131262.","journal-title":"Management Science"},{"key":"9145_CR3","unstructured":"Baldwin, C., & Clark, K. (1997). \u201cManaging in an age of modularity\u201d. Harvard Business Review."},{"key":"9145_CR4","doi-asserted-by":"crossref","unstructured":"Blinder, A. (2006). \u201cOffshoring: the next industrial revolution?\u201d Foreign Affairs, March\/April.","DOI":"10.2307\/20031915"},{"issue":"7","key":"9145_CR5","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1016\/S0950-5849(02)00025-3","volume":"44","author":"D. Chang","year":"2002","unstructured":"Chang, D., Son, J. H., & Kim, J. H. (2002). Critical path identification in the context of a workflow. Information and Software Technology, 44(7), 405\u2013417. doi: 10.1016\/S0950-5849(02)00025-3 .","journal-title":"Information and Software Technology"},{"key":"9145_CR6","unstructured":"Friedman, T. (2005). \u201cIt\u2019s a flat world, after all\u201d The New York Times, April 3."},{"key":"9145_CR7","volume-title":"The haystack syndrome","author":"E. M. Goldratt","year":"1991","unstructured":"Goldratt, E. M. (1991). The haystack syndrome. New York: North River."},{"key":"9145_CR8","volume-title":"The goal","author":"E. M. Goldratt","year":"1992","unstructured":"Goldratt, E. M. (1992). The goal. New York: North River."},{"issue":"1","key":"9145_CR9","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.datak.2005.02.007","volume":"56","author":"B. Ha","year":"2006","unstructured":"Ha, B., Bae, J., Park, Y., & Kang, S. (2006). Development of process execution rules for workload balancing on agents. Data & Knowledge Engineering, 56(1), 64\u201384. doi: 10.1016\/j.datak.2005.02.007 .","journal-title":"Data & Knowledge Engineering"},{"key":"9145_CR10","volume-title":"The agenda: What every business must do to dominate the decade","author":"M. Hammer","year":"2006","unstructured":"Hammer, M. (2006). The agenda: What every business must do to dominate the decade. New York: Crown Business."},{"key":"9145_CR11","unstructured":"Hellinger, M., Fingerhut, S. (2002). Business activity monitoring: EAI meets data warehousing. eAI Journal, 18\u201321, July"},{"issue":"4","key":"9145_CR12","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1177\/1063293X03039903","volume":"11","author":"W. Hur","year":"2003","unstructured":"Hur, W., Bae, H., & Kang, S. (2003). Customizable workflow monitoring. Concurrent Engineering\u2013Research and Applications, 11(4), 313\u2013326.","journal-title":"Concurrent Engineering\u2013Research and Applications"},{"key":"9145_CR13","unstructured":"Iansiti, M., & Levien, R. (2004). \u201cStrategy as ecology\u201d. Harvard Business Review, March."},{"issue":"1","key":"9145_CR14","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.dss.2004.04.005","volume":"40","author":"J. Kim","year":"2005","unstructured":"Kim, J., & Segev, A. (2005). A web services-enabled marketplace architecture for negotiation process management. Decision Support Systems, 40(1), 71\u201387. doi: 10.1016\/j.dss.2004.04.005 .","journal-title":"Decision Support Systems"},{"issue":"8","key":"9145_CR15","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/TKDE.2004.20","volume":"16","author":"Y. Kim","year":"2004","unstructured":"Kim, Y., Bae, J., Bae, H., & Kang, S. (2004). Automatic control of workflow processes using ECA rules. IEEE Transactions on Knowledge and Data Engineering, 16(8), 1010\u20131023. doi: 10.1109\/TKDE.2004.20 .","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"9145_CR16","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/4236.845391","volume":"4","author":"Y. Kim","year":"2000","unstructured":"Kim, Y., Kang, S., Kim, D., Bae, J., & Ju, K. (2000). WW-flow: web-based workflow management with runtime encapsulation. IEEE Internet Computing, 4(3), 55\u201364. doi: 10.1109\/4236.845391 .","journal-title":"IEEE Internet Computing"},{"key":"9145_CR17","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1023\/A:1008759413689","volume":"9","author":"M. Klein","year":"2000","unstructured":"Klein, M., & Dellarocas, C. A. (2000). Knowledge-based Approach to handling exceptions in workflow systems. Computer Supported Cooperative Work, 9, 399\u2013412. doi: 10.1023\/A:1008759413689 .","journal-title":"Computer Supported Cooperative Work"},{"key":"9145_CR18","doi-asserted-by":"crossref","unstructured":"Klusewitz, G., & Rerick, R. (1996). Constraint management through the drum-buffer-rope system. IEEE\/SEMI Advanced Semiconductor Manufacturing Conference, 7\u201312.","DOI":"10.1109\/ASMC.1996.557962"},{"key":"9145_CR19","volume-title":"Workflow handbook","author":"P. Lawrence","year":"1997","unstructured":"Lawrence, P. (1997). Workflow handbook. New York: Wiley."},{"key":"9145_CR20","unstructured":"McCoy, D. (2004). The convergence of BPM and BAM. Gartner Research Note (SPA-20-6074)."},{"key":"9145_CR21","doi-asserted-by":"crossref","unstructured":"Palmisano, S. (2006). \u201cThe globally integrated enterprise,\u201d Foreign Affairs, May\/June.","DOI":"10.2307\/20031973"},{"key":"9145_CR22","unstructured":"Rhee, S., Bae, H., Ahn, D., & Seo, Y. (2003).Efficient workflow management through the introduction of TOC concepts. Proceedings of The 8th Annual International Conference on Industrial Engineering Theory, Applications and Practice (IJIE2003)."},{"issue":"1","key":"9145_CR23","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s10796-006-9020-5","volume":"9","author":"S. Rhee","year":"2007","unstructured":"Rhee, S., Bae, H., & Choi, Y. (2007). Enhancing the efficiency of supply chain processes through web services. Information Systems Frontiers, 9(1), 103\u2013118. doi: 10.1007\/s10796-006-9020-5 .","journal-title":"Information Systems Frontiers"},{"key":"9145_CR24","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1007\/11424857_134","volume":"3482","author":"S. Rhee","year":"2005","unstructured":"Rhee, S., Song, H., Won, H. J., Ju, J., Kim, M., & Bae, H. (2005). Process-oriented development of job manual system. Lecture Notes in Computer Science, 3482, 1259\u20131268.","journal-title":"Lecture Notes in Computer Science"},{"key":"9145_CR25","doi-asserted-by":"crossref","unstructured":"Sayal, M., Casati, F., Dayal, U., & Shan, M.-C. (2002). Integrating workflow management systems with business-to-business interaction standards. Proceedings of the 18th International Conference on Data Engineering.","DOI":"10.1109\/ICDE.2002.994737"},{"key":"9145_CR26","volume-title":"Business process management\u2014The third wave","author":"H. Smith","year":"2003","unstructured":"Smith, H., & Fingar, P. (2003). Business process management\u2014The third wave. Florida: Meghan-Kiffer."},{"issue":"3","key":"9145_CR27","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/S0164-1212(01)00039-5","volume":"58","author":"J. H. Son","year":"2001","unstructured":"Son, J. H., & Kim, M. H. (2001). Improving the performance of time-constrained workflow processing. Journal of Systems and Software, 58(3), 211\u2013219. doi: 10.1016\/S0164-1212(01)00039-5 .","journal-title":"Journal of Systems and Software"},{"key":"9145_CR28","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/10722620_2","volume":"1901","author":"W. M. P. Aalst van der","year":"2000","unstructured":"van der Aalst, W. M. P., ter Hofstede, A. H. M., Kiepuszewski, B., & Barros, A. P. ( 2000). Advanced workflow patterns. Lecture notes in Computer Science, 1901, 18\u201319.","journal-title":"Lecture notes in Computer Science"},{"key":"9145_CR29","doi-asserted-by":"crossref","unstructured":"Wegner, P. (1997). Why interaction is more powerful than algorithms. Communications of the ACM, 40(5). doi: 10.1145\/253769.253801 .","DOI":"10.1145\/253769.253801"},{"issue":"7","key":"9145_CR30","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1016\/S0263-7863(01)00063-1","volume":"20","author":"C. Wei","year":"2002","unstructured":"Wei, C., Liu, P. H., & Tsai, Y. C. (2002). Resource-constrained project management using enhanced theory of constraint. International Journal of Project Management, 20(7), 561\u2013567. doi: 10.1016\/S0263-7863(01)00063-1 .","journal-title":"International Journal of Project Management"},{"key":"9145_CR31","volume-title":"Process definition interchange, WfMC-TC-1016-P","author":"Workflow Management Coalition.","year":"1999","unstructured":"Workflow Management Coalition. (1999a). Process definition interchange, WfMC-TC-1016-P. Florida: Lighthouse Point."},{"key":"9145_CR32","volume-title":"Terminology & glossary, WFMC-TC-1011","author":"Workflow Management Coalition.","year":"1999","unstructured":"Workflow Management Coalition. (1999b). Terminology & glossary, WFMC-TC-1011. Florida: Lighthouse Point."},{"key":"9145_CR33","unstructured":"Workflow Management Coalition. (2003). Pacific rim excellence award: workflow\u2014Korea First Bank."},{"key":"9145_CR34","unstructured":"Yefim, V. (2001). Natis application server scenario: from stovepipes to services, Gartner AV-14-5983."},{"issue":"2","key":"9145_CR35","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/295666.295687","volume":"24","author":"J. L. Zhao","year":"1999","unstructured":"Zhao, J. L., & Stohr, E. A. (1999). Temporal workflow management in a claim handling system. SIGSOFT: Software Engineering Notes, 24(2), 187\u2013195. doi: 10.1145\/295666.295687 .","journal-title":"SIGSOFT: Software Engineering Notes"},{"issue":"1","key":"9145_CR36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10796-007-9023-x","volume":"9","author":"J. L. Zhao","year":"2007","unstructured":"Zhao, J. L., Tanniru, M., & Zhang, L. J. (2007). Services computing as the foundation of enterprise agility. Information Systems Frontiers, 9(1), 1\u20138. doi: 10.1007\/s10796-007-9023-x .","journal-title":"Information Systems Frontiers"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-008-9145-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-008-9145-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-008-9145-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T00:36:11Z","timestamp":1559262971000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-008-9145-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,12]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["9145"],"URL":"https:\/\/doi.org\/10.1007\/s10796-008-9145-9","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,11,12]]}}}