{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:35:28Z","timestamp":1757309728115,"version":"3.41.2"},"reference-count":61,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2011,9,13]],"date-time":"2011-09-13T00:00:00Z","timestamp":1315872000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9,13]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Financial institutions have been engaged in numerous business process reengineering (BPR) projects to make their organizations more efficient. However, the success of BPR projects in banks varies significantly and it remains a challenge to systematically discover weaknesses in business process landscapes. Based on the flow chart notation language this paper seeks to argue for the definition of weakness patterns in order to automatically identify potential process weaknesses.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The authors developed weakness patterns in the flow chart notation language based on design science principles. To systematically derive process weaknesses that can be formalized, they analyzed each element of the flow chart notation as it was used in a real\u2010life case. They furthermore tested the identified patterns in reality in order to evaluate their validity.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The authors identified various potential weakness patterns that helped in automatically identifying weaknesses in process models. To some extent these findings are generalizable and transferable to other process modeling languages.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The pattern\u2010based approach depends upon how well structural weakness patterns are defined and formalized. Identified problems remain \u201cpotential\u201d weaknesses until a manual analysis reveals that the identified potential weaknesses are actually real weaknesses or not, e.g. due to law regulations.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Using weakness patterns allows for automatically identifying potential process weaknesses in existing flow chart models. This way, this research helps in improving the so far manual analysis of process model landscapes.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The approach is a new way of looking for process weaknesses through process weakness patterns.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14637151111166187","type":"journal-article","created":{"date-parts":[[2011,9,24]],"date-time":"2011-09-24T07:38:41Z","timestamp":1316849921000},"page":"787-807","source":"Crossref","is-referenced-by-count":10,"title":["Automatic identification of structural process weaknesses in flow chart diagrams"],"prefix":"10.1108","volume":"17","author":[{"given":"Axel","family":"Winkelmann","sequence":"first","affiliation":[]},{"given":"Burkhard","family":"Wei\u00df","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021120290673400_b1","unstructured":"Alexander, C. (1977), A Pattern Language: Towns, Buildings, Construction, Oxford University Press, New York, NY."},{"key":"key2022021120290673400_b2","doi-asserted-by":"crossref","unstructured":"Arendsen, R., van Engers, T. and Schurink, W. (2008), \u201cAdoption of high impact governmental eServices: seduce or enforce?\u201d, Proceedings of the 7th International Conference on Electronic Government (EGOV 2008), Turin, Italy, pp. 73\u201084.","DOI":"10.1007\/978-3-540-85204-9_7"},{"key":"key2022021120290673400_b3","doi-asserted-by":"crossref","unstructured":"Arnold, A. (1993), \u201cVerification and comparison of transition systems\u201d, Proceedings of the 4th International Joint Conference on Theory and Practice of Software Development (TAPSOFT 1993), Orsay, France, pp. 121\u201035.","DOI":"10.1007\/3-540-56610-4_60"},{"key":"key2022021120290673400_b4","doi-asserted-by":"crossref","unstructured":"Baacke, L., Becker, J., Bergener, P., Fitterer, R., Greiner, U., Stroh, F., R\u00e4ckers, M. and Rohner, P. (2009), \u201cEnabling integration and optimization of government processes with cross\u2010functional ICT\u201d, in Weerakkody, V., Janssen, M. and Dwivedi, Y.K. (Eds), Handbook of Research on ICT\u2010Enabled Transformational Government: A Global Perspective, Hershey, New York, NY, pp. 117\u201039.","DOI":"10.4018\/978-1-60566-390-6.ch007"},{"key":"key2022021120290673400_b7","doi-asserted-by":"crossref","unstructured":"Becker, J., Bergener, P. and R\u00e4ckers, M. (2009a), \u201cBusiness process assessment and evaluation in public administrations using activity\u2010based costing\u201d, Proceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, CA, USA.","DOI":"10.1007\/978-3-642-03516-6_15"},{"key":"key2022021120290673400_b10","unstructured":"Becker, J., Wei\u00df, B. and Winkelmann, A. (2010a), \u201cUtility vs. efforts of business process modeling in the banking sector \u2013 an exploratory survey\u201d, Proceedings of the 5th Multikonferenz Wirtschaftsinformatik (MKWI 2010), G\u00f6ttingen, Germany."},{"key":"key2022021120290673400_b11","unstructured":"Becker, J., Breuker, D., Wei\u00df, B. and Winkelmann, A. (2010b), \u201cExploring the status quo of business process modelling languages in the banking sector \u2013 an empirical insight into the usage of methods in banks\u201d, Proceedings of the 21st Australasian Conference on Information Systems (ACIS 2010), Brisbane, Australia."},{"key":"key2022021120290673400_b8","doi-asserted-by":"crossref","unstructured":"Becker, J., Delfmann, P., Herwig, S. and Lis, L. (2009b), \u201cA generic set theory\u2010based pattern matching approach for the analysis of conceptual models\u201d, Proceedings of the 28th International Conference on Conceptual Modeling (ER 2009), Lecture Notes in Computer Science, Gramado, Brazil, pp. 41\u201054.","DOI":"10.1007\/978-3-642-04840-1_6"},{"key":"key2022021120290673400_b5","unstructured":"Becker, J., Algermissen, L., Falk, T., Pfeiffer, D. and Fuchs, P. (2006), \u201cModel based identification and measurement of reorganization potential in public administrations: the PICTURE\u2010approach\u201d, Proceedings of the 10th Pacific Asia Conference on Information Systems (PACIS 2006), Kuala Lumpur, Malaysia, pp. 860\u201075."},{"key":"key2022021120290673400_b6","doi-asserted-by":"crossref","unstructured":"Becker, J., Bergener, P., Kleist, S., Pfeiffer, D. and R\u00e4ckers, M. (2008), \u201cEvaluation of ICT investments in public administrations based on business process models\u201d, Lecture Notes in Computer Science, Electronic Government, Vol. 5184, pp. 124\u201035.","DOI":"10.1007\/978-3-540-85204-9_11"},{"key":"key2022021120290673400_b12","unstructured":"Becker, J., Bergener, P., R\u00e4ckers, M., Wei\u00df, B. and Winkelmann, A. (2010c), \u201cPattern based semi\u2010automatic analysis of weaknesses in semantic business process models in the banking sector\u201d, Proceedings of the European Conference on Information Systems (ECIS 2010), Pretoria, South Africa."},{"key":"key2022021120290673400_b9","unstructured":"Becker, J., Delfmann, P., Herwig, S., Lis, L. and Stein, A. (2009c), \u201cTowards increased comparability of conceptual models \u2013 enforcing naming conventions through domain thesauri and linguistic grammars\u201d, Proceedings of the 17th European Conference on Information Systems (ECIS 2009), Verona, Italy."},{"key":"key2022021120290673400_b13","unstructured":"Benamou, N. (2005), \u201cBringing eGovernment interoperability to local governments in Europe\u201d, European Rev. Political Technology, No. 3, pp. 8\u201014."},{"key":"key2022021120290673400_b14","doi-asserted-by":"crossref","unstructured":"Biazzo, S. (2000), \u201cApproaches to business process analysis: a review\u201d, Business Process Management Journal, Vol. 6 No. 2, pp. 99\u2010112.","DOI":"10.1108\/14637150010321277"},{"key":"key2022021120290673400_b15","unstructured":"Blechar, M.J. (2007), \u201cMagic quadrant for business process analysis tools\u201d, Gartner RAS Core Research Note G00148777, Gartner, Inc., Stamford, CT."},{"key":"key2022021120290673400_b16","doi-asserted-by":"crossref","unstructured":"Brown, R.E., Myring, M.J. and Gard, C.G. (1999), \u201cActivity\u2010based costing in government: possibilities and pitfalls\u201d, Public Budgeting and Finance, Vol. 19 No. 2, pp. 3\u201021.","DOI":"10.1046\/j.0275-1100.1999.01160.x"},{"key":"key2022021120290673400_b17","doi-asserted-by":"crossref","unstructured":"Bunke, H. (1997), \u201cOn a relation between graph edit distance and maximum common subgraph\u201d, Pattern Recognition Letters, Vol. 18 No. 9, pp. 689\u201094.","DOI":"10.1016\/S0167-8655(97)00060-3"},{"key":"key2022021120290673400_b18","doi-asserted-by":"crossref","unstructured":"Bunke, H. and Shearer, K. (1998), \u201cA graph distance metric based on the maximal common subgraph\u201d, Pattern Recognition Letters, Vol. 19 Nos 3\/4, pp. 255\u20109.","DOI":"10.1016\/S0167-8655(97)00179-7"},{"key":"key2022021120290673400_b19","unstructured":"Davenport, T.H. and Short, J.E. (1990), \u201cThe new industrial engineering: information technology and business process redesign\u201d, Sloan Management Review, Vol. 31, pp. 11\u201027."},{"key":"key2022021120290673400_b20","doi-asserted-by":"crossref","unstructured":"de Medeiros, A.K.A., van der Aalst, W.M.P. and Weijters, A.J.M.M. (2008), \u201cQuantifying process equivalence based on observed behavior\u201d, Data Knowledge Engineering, Vol. 64 No. 1, pp. 55\u201074.","DOI":"10.1016\/j.datak.2007.06.010"},{"key":"key2022021120290673400_b22","unstructured":"Delfmann, P., Herwig, S., Lis, L. and Stein, A. (2009), \u201cPattern matching in conceptual models \u2013 a formal multi\u2010modelling language approach\u201d, Proceedings of the 3rd International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA 2009), Lecture Notes in Informatics, Ulm, Germany, pp. 13\u201026."},{"key":"key2022021120290673400_b21","doi-asserted-by":"crossref","unstructured":"Desel, J. and Erwin, T. (2000), \u201cModeling, simulation and analysis of business processes\u201d, Lecture Notes in Computer Science, Vol. 1806, pp. 129\u201041.","DOI":"10.1007\/3-540-45594-9_9"},{"key":"key2022021120290673400_b23","doi-asserted-by":"crossref","unstructured":"Drake, L., Hall, M. and Simper, R. (2009), \u201cBank modelling methodologies: a comparative non\u2010parametric analysis of efficiency in the Japanese banking sector\u201d, Journal of International Financial Markets, Institutions, Money, Vol. 19 No. 1, pp. 1\u201015.","DOI":"10.1016\/j.intfin.2007.05.002"},{"key":"key2022021120290673400_b24","doi-asserted-by":"crossref","unstructured":"Dumas, M., van der Aalst, W.M.P. and ter Hofstede, A.H.M. (2005), Process\u2010aware Information Systems: Bridging People and Software through Process Technology, Wiley, New York, NY.","DOI":"10.1002\/0471741442"},{"key":"key2022021120290673400_b25","unstructured":"Fryman, M.A. (2002), Quality and Process Improvement, Delmar Thompson Learning, New York, NY."},{"key":"key2022021120290673400_b26","doi-asserted-by":"crossref","unstructured":"Gori, M., Maggini, M. and Sarti, L. (2005), \u201cThe RW2 algorithm for exact graph matching\u201d, in Singh, S., Singh, M., Apt\u00e9, C. and Perner, P. (Eds), Proceedings of the 4th International Conference on Advances in Pattern Recognition (ICAPR 2005), Bath, UK, pp. 81\u20108.","DOI":"10.1007\/11551188_9"},{"key":"key2022021120290673400_b27","unstructured":"Gromoff, A.I. (2008), \u201cImproving business processes based on content analysis\u201d, Information Technology, Vol. 3, pp. 12\u201017 (in Russian)."},{"key":"key2022021120290673400_b28","unstructured":"Gromoff, A.I. (2009), Logical Analysis of Faulty Processes, State University \u2013 Higher School of Economics, Moscow (in Russian)."},{"key":"key2022021120290673400_b29","unstructured":"Guizzardi, G., Pires, L.F. and van Sinderen, M.J. (2002), \u201cOn the role of domain ontologies in the design of domain\u2010specific visual modeling languages\u201d, Proceedings of the 2nd Workshop on Domain\u2010Specific Visual Languages at the 17th Annual ACM Conference on Object\u2010Oriented Programming, Systems, Languages and Applications (OOPSLA 2002), Seattle, WA, USA, pp. 1\u201014."},{"key":"key2022021120290673400_b30","unstructured":"Hammer, J. and Champy, M.A. (1992), \u201cWhat is reengineering?\u201d, Information Week, 5 May, pp. 10\u201024."},{"key":"key2022021120290673400_b31","unstructured":"Harmon, P. and Wolf, C. (2008), \u201cThe state of business process management\u201d, BPTrends, February."},{"key":"key2022021120290673400_b32","unstructured":"Heckl, D. (2007), Steuerung von Kreditprozessen, ProcessLab\u2010Studie, Frankfurt."},{"key":"key2022021120290673400_b33","doi-asserted-by":"crossref","unstructured":"Herrmann, P. and Herrmann, G. (2006), \u201cSecurity requirement analysis of business processes\u201d, Electronic Commerce Research, Vol. 6 Nos 3\/4, pp. 305\u201035.","DOI":"10.1007\/s10660-006-8677-7"},{"key":"key2022021120290673400_b34","doi-asserted-by":"crossref","unstructured":"Hevner, A.R., March, S.T., Park, J. and Ram, S. (2004), \u201cDesign science in information systems research\u201d, MIS Quarterly, Vol. 28 No. 1, pp. 75\u2010105.","DOI":"10.2307\/25148625"},{"key":"key2022021120290673400_b35","unstructured":"Hidders, J., Dumas, M., van der Aalst, W.M.P., ter Hofstede, A.H.M. and Verelst, J. (2005), \u201cWhen are two workflows the same?\u201d, Proceedings of the 11th Australasian Symposium on Theory of Computing (CATS 2005), Newcastle, Australia, pp. 3\u201011."},{"key":"key2022021120290673400_b36","doi-asserted-by":"crossref","unstructured":"Hirshfeld, Y. (1993), \u201cPetri nets and the equivalence problem\u201d, Proceedings of the 7th Workshop on Computer Science Logic (CSL 1993), Swansea, UK, pp. 165\u201074.","DOI":"10.1007\/BFb0049331"},{"key":"key2022021120290673400_b37","unstructured":"H\u00f6fferer, P. (2007), \u201cAchieving business process model interoperability using metamodels and ontologies\u201d, Proceedings of the 15th European Conference on Information Systems (ECIS 2007), St. Gallen, Switzerland, pp. 1620\u201031."},{"key":"key2022021120290673400_b38","doi-asserted-by":"crossref","unstructured":"Jallow, A.K., Majeed, B., Vergidis, K., Tiwari, A. and Roy, R. (2006), \u201cOperational risk analysis in business processes\u201d, BT Technology Journal, Vol. 25 No. 1, pp. 168\u201077.","DOI":"10.1007\/s10550-007-0018-4"},{"key":"key2022021120290673400_b39","unstructured":"Keller, G., N\u00fcttgens, M. and Scheer, A.\u2010W. (1992), \u201cSemantische Prozessmodellierung auf der Grundlage Ereignisgesteuerter Prozessketten (EPK)\u201d, Ver\u00f6ffentlichungen des Instituts f\u00fcr Wirtschaftsinformatik, No. 89, Universit\u00e4t des Saarlandes, Saarbr\u00fccken."},{"key":"key2022021120290673400_b40","doi-asserted-by":"crossref","unstructured":"Kueng, P. (2000), \u201cProcess performance measurement system: a tool to support process\u2010based organizations\u201d, Total Quality Management, Vol. 11 No. 1, pp. 67\u201085.","DOI":"10.1080\/0954412007035"},{"key":"key2022021120290673400_b41","doi-asserted-by":"crossref","unstructured":"Kusiak, A., Larson, T.N. and Wang, J.R. (1994), \u201cReengineering of design and manufacturing processes\u201d, Computers & Industrial Engineering, Vol. 26 No. 3, pp. 521\u201036.","DOI":"10.1016\/0360-8352(94)90048-5"},{"key":"key2022021120290673400_b42","doi-asserted-by":"crossref","unstructured":"Lindsay, A., Downs, D. and Lunn, K. (2003), \u201cBusiness processes: attempts to find a definition\u201d, Information and Software Technology, Vol. 45 No. 1, pp. 1015\u201019.","DOI":"10.1016\/S0950-5849(03)00129-0"},{"key":"key2022021120290673400_b43","unstructured":"Mayer, R.J., Benjamin, P.C., Caraway, B.E. and Painter, M.K. (1998), \u201cFramework and a suite of methods for business process reengineering\u201d, in Grover, V. and Kettinger, W. (Eds), Business Process Change: Reengineering Concepts, Methods and Technologies, Idea Group Publishing, Harrisburg, pp. 245\u201090."},{"key":"key2022021120290673400_b44","doi-asserted-by":"crossref","unstructured":"Namiri, K. and Stojanovic, N. (2007), \u201cPattern\u2010based design and validation of business process compliance\u201d, Proceedings of the 15th International Conference on Cooperative Information Systems (CoopIS 2007), Vilamoura, Portugal, pp. 59\u201076.","DOI":"10.1007\/978-3-540-76848-7_6"},{"key":"key2022021120290673400_b46","unstructured":"Object Management Group (2004), \u201cUML 2.0 superstructure specification\u201d, available at: www.omg.org\/cgi\u2010bin\/doc?formal\/05\u201007\u201004 (accessed 28 February 2010)."},{"key":"key2022021120290673400_b45","unstructured":"Object Management Group (2006), \u201cBPMN final adopted specification 1.0\u201d, available at: www.bpmn.org\/Documents\/BPMN_1\u20101_Specification.pdf (accessed 28 February 2010)."},{"key":"key2022021120290673400_b47","doi-asserted-by":"crossref","unstructured":"Peffers, K., Tuuanen, T., Rothenberger, M.A. and Chatterjee, S. (2007), \u201cA design science research methodology for information systems research\u201d, Journal of Management Information Systems, Vol. 24, pp. 45\u201077.","DOI":"10.2753\/MIS0742-1222240302"},{"key":"key2022021120290673400_b48","unstructured":"Petri, C.A. (1962), Kommunikation mit Automaten, Mathematisches Institut der Universit\u00e4t Bonn, Bonn."},{"key":"key2022021120290673400_b49","doi-asserted-by":"crossref","unstructured":"Petri, C.A. and Reisig, W. (2008), \u201cPetri net\u201d, Scholarpedia, Vol. 3 No. 4, p. 6477, available at: www.scholarpedia.org\/wiki\/index.php?title=Petri_net&oldid=36825 (accessed 28 February 2010).","DOI":"10.4249\/scholarpedia.6477"},{"key":"key2022021120290673400_b50","unstructured":"Pfeiffer, D. (2007), \u201cConstructing comparable conceptual models with domain specific languages\u201d, Proceedings of the 15th European Conference on Information Systems (ECIS 2007), St Gallen, Switzerland, pp. 876\u201088."},{"key":"key2022021120290673400_b51","unstructured":"Pfeiffer, D. (2008), \u201cSemantic business process analysis: building block\u2010based construction of automatically analyzable business process models\u201d, Dissertation, Westf\u00e4lische Wilhelms\u2010Universit\u00e4t M\u00fcnster."},{"key":"key2022021120290673400_b52","doi-asserted-by":"crossref","unstructured":"Pomello, L., Rozenberg, G. and Simone, C. (1992), \u201cA survey of equivalence notions for net based systems\u201d, Advances in Petri Nets: The DEMON Project, Springer, London, pp. 410\u201072.","DOI":"10.1007\/3-540-55610-9_180"},{"key":"key2022021120290673400_b53","doi-asserted-by":"crossref","unstructured":"Rosemann, M. (2007), \u201cPreparation of process modeling\u201d, in Becker, J., Kugeler, M. and Rosemann, M. (Eds), Process Management: A Guide for the Design of Business Processes, 2nd ed., Springer, Berlin, pp. 41\u201078.","DOI":"10.1007\/978-3-540-24798-2_3"},{"key":"key2022021120290673400_b54","doi-asserted-by":"crossref","unstructured":"Scheer, A.\u2010W. (2000), ARIS \u2013 Business Process Modeling, Springer, Heidelberg.","DOI":"10.1007\/978-3-642-57108-4"},{"key":"key2022021120290673400_b55","unstructured":"Thomas, O. and Fellmann, M. (2007), \u201cSemantic business process management: ontology\u2010based process modeling using event\u2010driven process chains\u201d, International Journal of Interoperability in Business Information Systems, Vol. 2 No. 1, pp. 29\u201044."},{"key":"key2022021120290673400_b56","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P., ter Hofstede, A.H.M. and Weske, M. (2003), \u201cBusiness process management: a survey\u201d, Lecture Notes in Computer Science, Vol. 2678, pp. 1\u201012.","DOI":"10.1007\/3-540-44895-0_1"},{"key":"key2022021120290673400_b57","doi-asserted-by":"crossref","unstructured":"van Hee, K.M. and Reijers, H.A. (2000), \u201cUsing formal analysis techniques in business process redesign\u201d, Lecture Notes in Computer Science, Vol. 1806, pp. 142\u201060.","DOI":"10.1007\/3-540-45594-9_10"},{"key":"key2022021120290673400_b58","doi-asserted-by":"crossref","unstructured":"Vergidis, K., Tiwari, A., Majeed, B. and Roy, R. (2007), \u201cOptimisation of business process designs: an algorithmic approach with multiple objectives\u201d, International Journal of Production Economics, Vol. 109 Nos 1\/2, pp. 105\u201021.","DOI":"10.1016\/j.ijpe.2006.12.032"},{"key":"key2022021120290673400_b59","doi-asserted-by":"crossref","unstructured":"Wand, Y. and Weber, R. (1990), \u201cAn ontological model of an information system\u201d, IEEE Transactions on Software Engineering, Vol. 16 No. 11, pp. 1282\u201092.","DOI":"10.1109\/32.60316"},{"key":"key2022021120290673400_b60","doi-asserted-by":"crossref","unstructured":"Yu, B. and Wright, D.T. (1997), \u201cSoftware tools supporting business process analysis and modeling\u201d, Business Process Management Journal, Vol. 3 No. 2, pp. 133\u201050.","DOI":"10.1108\/14637159710173096"},{"key":"key2022021120290673400_b61","doi-asserted-by":"crossref","unstructured":"Zairi, M. (1997), \u201cBusiness process management: a boundaryless approach to modern competitiveness\u201d, Business Process Management Journal, Vol. 3 No. 1, pp. 64\u201080.","DOI":"10.1108\/14637159710161585"}],"container-title":["Business Process Management Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14637151111166187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637151111166187\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637151111166187\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:36:28Z","timestamp":1753403788000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/bpmj\/article\/17\/5\/787-807\/256563"}},"subtitle":[],"editor":[{"given":"Stefan","family":"Smolnik","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2011,9,13]]},"references-count":61,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2011,9,13]]}},"alternative-id":["10.1108\/14637151111166187"],"URL":"https:\/\/doi.org\/10.1108\/14637151111166187","relation":{},"ISSN":["1463-7154"],"issn-type":[{"type":"print","value":"1463-7154"}],"subject":[],"published":{"date-parts":[[2011,9,13]]}}}