{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T17:01:57Z","timestamp":1761843717505,"version":"3.41.2"},"reference-count":29,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2008,2,8]],"date-time":"2008-02-08T00:00:00Z","timestamp":1202428800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,2,8]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Because of the competitive economy, organizations today seek to rationalize, innovate and adapt to changing environments and circumstances as part of business process reengineering (BPR) efforts. Irrespective of the process reengineering program selected and the technique used to model it, BPR brings with it the issues of organizational and process changes. Thus, BPR initiatives involve risk taking. Effective management of risks and their prediction and estimation should help in minimizing failures from BPR efforts. Risk management is non\u2010trivial due to the large uncertainty involved with business success with BPR efforts. Though some attempt has been made to model risk management in enterprise information systems using conventional conceptual modelling techniques, the previous works have analyzed and modeled the same just by addressing \u201cwhat\u201d a process is like, but do not address \u201cwhy\u201d the process is the way it is.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The approach presents a new technique for analyzing and modelling early\u2010phase requirements of organizational risk management that provides the motivations, intents, and rationales behind the entities and activities.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>A case study has been considered to illustrate this approach.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The approach is novel in the sense that there is no similar intentional modeling approach for risk management to the best of one's knowledge. The approach is expected to be valuable because by using this approach one can reason about the risks associated with BPR and can incorporate prominently the issues related to risk in the process of systems analysis and design.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14637150810849418","type":"journal-article","created":{"date-parts":[[2008,2,9]],"date-time":"2008-02-09T07:04:59Z","timestamp":1202540699000},"page":"65-84","source":"Crossref","is-referenced-by-count":6,"title":["Modelling strategic actor relationships for risk management in organizations undergoing business process reengineering due to information systems adoption"],"prefix":"10.1108","volume":"14","author":[{"given":"Subhas C.","family":"Misra","sequence":"first","affiliation":[]},{"given":"Uma","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Vinod","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020920143183700_b1","unstructured":"Boehmm, B.W. and Bose, P. (1994), \u201cA collaborative spiral software process model based on theory W\u201d, Proceedings of the 3rd International Conference on Software Process, IEEE Computer Society, Washington, DC."},{"key":"key2022020920143183700_b2","unstructured":"Charette, R.N. (1989), Software Engineering Risk Analysis and Management, McGraw\u2010Hill, New York, NY."},{"key":"key2022020920143183700_b3","doi-asserted-by":"crossref","unstructured":"Chung, L., Nixon, B., Yu, E. and Mylopoulos, J. (2000), Non\u2010Functional Requirements in Software Engineering, Kluwer Academic Publishers, Dordrecht.","DOI":"10.1007\/978-1-4615-5269-7"},{"key":"key2022020920143183700_b4","doi-asserted-by":"crossref","unstructured":"Coles, R.S. and Moulton, R. (2003), \u201cOperationalizing IT risk management\u201d, Computers and Security, Vol. 22 No. 2, pp. 487\u201093.","DOI":"10.1016\/S0167-4048(03)00606-0"},{"key":"key2022020920143183700_b6","unstructured":"Donzelli, P. (2002), \u201cAgents, goals, and quality in a structured requirements engineering framework \u2013 a case study\u201d, Proceedings of CAiSE'02, Toronto, Ontario."},{"key":"key2022020920143183700_b5","doi-asserted-by":"crossref","unstructured":"Donzelli, P. and Bresciani, P. (2003), \u201cAn agent\u2010based requirements engineering framework for complex socio\u2010technical systems\u201d, Proceedings of SELMAS 2003, Portland, Oregon, USA.","DOI":"10.1007\/978-3-540-25943-5_11"},{"key":"key2022020920143183700_b7","doi-asserted-by":"crossref","unstructured":"Dubois, E., Yu, E. and Petit, M. (1998), \u201cFrom early to late formal requirements: a process control case study\u201d, Proc. 9th International Workshop on Software Specification and Design, Ise\u2010Shima, Japan, pp. 34\u201042.","DOI":"10.1109\/IWSSD.1998.667917"},{"key":"key2022020920143183700_b8","doi-asserted-by":"crossref","unstructured":"Fairley, R. (1994), \u201cRisk management of software projects\u201d, IEEE Software, Vol. 11, pp. 57\u201067.","DOI":"10.1109\/52.281716"},{"key":"key2022020920143183700_b10","unstructured":"Foo, S\u2010W. and Muruganantham, A. (2003), \u201cSoftware risk assessment model\u201d, Proc. of the 2003 IEEE International Conference on Management of Innovation and Technology, Vol. 2, pp. 536\u201044."},{"key":"key2022020920143183700_b9","doi-asserted-by":"crossref","unstructured":"Freimut, B., Hartkopf, S., Kontio, J. and Kobitzsch, W. (2001), \u201cAn industrial case study of implementing software risk management\u201d, Proceedings of the 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Vienna, pp. 277\u201087.","DOI":"10.1145\/503271.503247"},{"key":"key2022020920143183700_b12","doi-asserted-by":"crossref","unstructured":"Gans, G., Jarke, M., Kethers, S. and Lakemeyer, G. (2003), \u201cContinuous requirements management for organisation networks: a (dis)trust\u2010based approach\u201d, Requirements Engineering, Vol. 8 No. 1, pp. 4\u201022.","DOI":"10.1007\/s00766-002-0163-8"},{"key":"key2022020920143183700_b11","unstructured":"Gans, G., Jarke, M., Kethers, S., Lakemeyer, G., Ellrich, L., Funken, C. and Meister, M. (2001), \u201cRequirements modelling for organization networks: a (dis)trust\u2010based approach\u201d, Proceedings of the 5th IEEE International Symposium on Requirements Engineering, Toronto."},{"key":"key2022020920143183700_b13","unstructured":"Gemmer, A. and Koch, P. (2003), \u201cRockwell case studies in risk management\u201d, Proceedings of the 3rd SEI Conference on Software Risk Management, SEI, Pittsburgh, PA."},{"key":"key2022020920143183700_b25","doi-asserted-by":"crossref","unstructured":"Georgakopoulos, D., Hornick, M.F. and Sheth, A.P. (1995), \u201cAn overview of workflow management: from process modeling to workflow automation infrastructure\u201d, Distributed and Parallel Databases, Vol. 3 No. 2, pp. 119\u201053.","DOI":"10.1007\/BF01277643"},{"key":"key2022020920143183700_b14","doi-asserted-by":"crossref","unstructured":"Giunchiglia, F., Mylopoulos, J. and Perini, A. (2002), \u201cThe Tropos software development methodology: processes, models and diagrams\u201d, Proceedings of AOSE\u20102002, Bologna, Italy.","DOI":"10.1145\/544741.544748"},{"key":"key2022020920143183700_b15","doi-asserted-by":"crossref","unstructured":"Goseva\u2010Popstojanova, K., Hassan, A., Guiedem, A. and Abdelmoez, W. (2003), \u201cArchitecture level risk analysis using UML\u201d, IEEE Transactions on Software Engineering, Vol. 29 No. 10, pp. 946\u201059.","DOI":"10.1109\/TSE.2003.1237174"},{"key":"key2022020920143183700_b26","unstructured":"Harmon, P. (2003), Business Process Change: A Manager's Guide to Improving, Redesigning, and Automating Processes, Morgan Kaufmann, Amsterdam."},{"key":"key2022020920143183700_b16","unstructured":"Henderson\u2010Sellers, B., Giorgini, P. and Bresciani, P. (2003), \u201cEnhancing agent open with concepts used in the Tropos methodology\u201d, Proceedings of the Fourth International Workshop Engineering Societies in the Agents World, Imperial College, London, UK."},{"key":"key2022020920143183700_b17","unstructured":"Keshlaf, A.A. and Hashim, K. (2000), \u201cA model and prototype tool to manage software risks\u201d, Proceedings of the First Asia Pacific Conference on Quality Software, Kowloon, Hong Kong, pp. 297\u2010305."},{"key":"key2022020920143183700_b18","unstructured":"Kontio, J. (1997), \u201cThe Riskit method for software risk management\u201d, Version 1.00 Technical Report, CS\u2010TR\u20103782\/UMIACS\u2010TR\u201097\u201038, University of Maryland, Computer Science, College Park, MD."},{"key":"key2022020920143183700_b19","unstructured":"Koubarakis, M. and Plexousakis, D. (2000), \u201cA formal model for business process modelling and design\u201d, Proceedings of CAiSE'00, Stockholm, Sweden."},{"key":"key2022020920143183700_b27","unstructured":"Kueng, P. and Kaulek, P. (1997), \u201cProcess models: a help or a burden\u201d, Proceedings of the American for Information Systems, AIS, Indianapolis."},{"key":"key2022020920143183700_b28","doi-asserted-by":"crossref","unstructured":"Kueng, P., Kawalek, P. and Bichler, P. (1996), \u201cHow to compose an object\u2010oriented business process model?\u201d, working paper, IPG, available at: www.cs.man.ac.uk\/ipg.","DOI":"10.1007\/978-0-387-35080-6_7"},{"key":"key2022020920143183700_b21","unstructured":"Molani, A., Perini, A., Yu, E. and Bresciani, P. (2003), \u201cAnalysing the requirements for knowledge management using intentional analysis\u201d, paper presented at AAAI Spring Symposium on Agent\u2010Mediated Knowledge Management (AMKM\u201003), Stanford University, Palo Alto, CA."},{"key":"key2022020920143183700_b20","doi-asserted-by":"crossref","unstructured":"Mouratidis, H., Giorgini, P. and Manson, G. (2003), \u201cAn ontology for modelling security: the Tropos approach\u201d, Proceedings of the KES 2003, University of Oxford, Oxford, UK.","DOI":"10.1007\/978-3-540-45224-9_187"},{"key":"key2022020920143183700_b22","doi-asserted-by":"crossref","unstructured":"Mylopoulos, J., Chung, L. and Yu, E. (1999), \u201cFrom object\u2010oriented to goal\u2010oriented requirements analysis\u201d, Communications of the ACM, Vol. 42 No. 1, pp. 31\u20107.","DOI":"10.1145\/291469.293165"},{"key":"key2022020920143183700_b29","unstructured":"Ould, M.A. (1995), Business Processes \u2013 Modelling and Analysis for Re\u2010engineering and Improvement, Wiley, Chichester."},{"key":"key2022020920143183700_b24","unstructured":"Yu, E.S.K. (1997), \u201cTowards modelling and reasoning support for early\u2010phase requirement engineering\u201d, Proceedings of the 3rd IEEE International Symposium on Requirements Engineering, Annapolis, MD, USA, p. 226."},{"key":"key2022020920143183700_frd1","doi-asserted-by":"crossref","unstructured":"Sutcliffe, A.G. and Minocha, S. (1999), \u201cLinking business modelling to socio\u2010technical system design\u201d, Proceedings of CAiSE'99, pp. 73\u201087.","DOI":"10.1007\/3-540-48738-7_7"}],"container-title":["Business Process Management Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14637150810849418","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637150810849418\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637150810849418\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:36:04Z","timestamp":1753403764000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/bpmj\/article\/14\/1\/65-84\/257793"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,2,8]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,2,8]]}},"alternative-id":["10.1108\/14637150810849418"],"URL":"https:\/\/doi.org\/10.1108\/14637150810849418","relation":{},"ISSN":["1463-7154"],"issn-type":[{"type":"print","value":"1463-7154"}],"subject":[],"published":{"date-parts":[[2008,2,8]]}}}