{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T01:25:18Z","timestamp":1772501118531,"version":"3.50.1"},"reference-count":62,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T00:00:00Z","timestamp":1594684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BPMJ"],"published-print":{"date-parts":[[2021,1,25]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The purposes of this paper are: (1) to identify what types of business process operation controllers are discussed in literature and how can they be classified in order to establish the available body of knowledge in the literature, and then, (2) to identify which concepts are relevant for business process operation control and how are these concepts related in order to offer a reference model for assessing how well are control layers enforced in the dynamic stable nature of an enterprise' business processes operation.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>One cycle of the circular framework for literature review as proposed by Vom Brocke<jats:italic>et al.<\/jats:italic>(2009) is followed. Five stages are comprised: (1) definition of review scope (Section 1 and 2), (2) conceptualization of topic (Section 3), (3) literature search (Section 4), (4) literature analysis and synthesis (Section 5), and (5) definition of a research agenda (Section 6 that also concludes the paper). Vom Brocke, J., Simons, A., Niehaves, B., Niehaves, B., Reimer, K., Plattfaut, R., and Cleven, A. (2009), \u201cReconstructing the giant: on the importance of rigour in documenting the literature search process\u201d, ECIS 2009 Proceedings, Vol. 161.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Results indicate that (1) many studies exist in the literature, but no integrated knowledge is proposed, hindering the advance of knowledge in this field, (2) a knowledge gap exists between the implemented solutions and the conceptualization needed to generalize the solution to other contexts. Also, the ontology proposed provides a reference model for assessing the maturity of the business process control operation.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title><jats:p>The contents contained in the paper needs to be further deepened to include the concepts of \u201cbusiness process management\u201d and \u201cbusiness process mining\u201d, as well as a semantic equivalence study between concepts can integrate better this conceptual framework and identify similarities. Then, the relationship between industries and dynamically stable business processes operation concepts have not yet been fully investigated. Thirdly, the atypical curve of interest that business processes operational control has been receiving in literature is not fully understood.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title><jats:p>Some example applications that could benefit from this ontology are (1) security policy for business processes fine grained access control; (2) business processes enforced with decentralized policies, e.g. blockchain; (3) business process compliance and change; or (4) intelligent enterprise decision-making process, e.g. using AI trained neural network to support the human decision to choose if a control actuation is positive or negative instead of relying only on human-based decisions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Social implications<\/jats:title><jats:p>We understand that business process operation is a dynamically stable system, where steady motion is achieved with the continuous imposition of actor's actions. Therefore, all the work that contribute to the development of knowledge regarding the actor's actions in their execution environment offer the ability to optimize, and\/or reengineering, business processes delivering more social value or better social conditions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>In the best of our knowledge this work is unique in the sense that integrates a set of concepts that is rarely, or never, combined. Table 3 corroborates this result.<\/jats:p><\/jats:sec>","DOI":"10.1108\/bpmj-02-2020-0072","type":"journal-article","created":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T09:44:17Z","timestamp":1594719857000},"page":"24-54","source":"Crossref","is-referenced-by-count":11,"title":["Conceptualizing on dynamically stable business processes operation: a literature review on existing concepts"],"prefix":"10.1108","volume":"27","author":[{"given":"S\u00e9rgio","family":"Guerreiro","sequence":"first","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2020,7,14]]},"reference":[{"key":"key2022092113481421400_ref001","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.17705\/1CAIS.03455","article-title":"Theory of workarounds","volume":"34","year":"2014","journal-title":"Communications of the Association for Information Systems"},{"issue":"2","key":"key2022092113481421400_ref002","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1057\/ejis.2009.49","article-title":"Competing pressures of risk and absorptive capacity potential on commitment and information sharing in global supply chains","volume":"19","year":"2010","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"key2022092113481421400_ref003","doi-asserted-by":"crossref","first-page":"807","DOI":"10.25300\/MISQ\/2016\/40:4.03","article-title":"Transformational issues of big data and analytics in networked business","volume":"40","year":"2016","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2022092113481421400_ref004","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1287\/isre.1120.0450. eprint","article-title":"On risk management with information flows in business processes","volume":"24","year":"2013","journal-title":"Information Systems Research"},{"key":"key2022092113481421400_ref005","first-page":"487","article-title":"CIO reporting structure, strategic positioning, and firm performance","year":"2011","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2022092113481421400_ref006","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1046\/j .1365- 2575.1998.00042.x. eprint","article-title":"Towards the construction of workow-suitable conceptual modelling techniques","volume":"8","year":"1998","journal-title":"Information Systems Journal"},{"key":"key2022092113481421400_ref007","volume-title":"General Systems Theory","year":"1968"},{"issue":"2","key":"key2022092113481421400_ref008","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1057\/ejis . 2010.8","article-title":"Building a successful relationship in business process outsourcing: an exploratory study","volume":"19","year":"2010","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"key2022092113481421400_ref009","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.25300\/MISQ\/2016\/40.4.10","article-title":"Comprehensible predictive models for business processes","volume":"40","year":"2016","journal-title":"MIS Quarterly"},{"key":"key2022092113481421400_ref010","first-page":"131","article-title":"Flexible and fine-grained mandatory access control on android for diverse security and privacy policies","year":"2013"},{"issue":"3","key":"key2022092113481421400_ref011","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1057\/ejis.2013.4","article-title":"IT capability and organizational performance: the roles of business process agility and environmental factors","volume":"23","year":"2014","journal-title":"European Journal of Information Systems"},{"key":"key2022092113481421400_ref012","volume-title":"Business Dynamics: Business Process Re-engineering and Systems Dynamics","year":"1996"},{"key":"key2022092113481421400_ref013","first-page":"3717","article-title":"Using entropy's justificatory knowledge for a business process design theory","year":"2014"},{"key":"key2022092113481421400_ref014","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1007\/1157586388","article-title":"A world ontology Specification Language","volume-title":"On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops Lecture Notes in Computer Science","year":"2005"},{"key":"key2022092113481421400_ref015","volume-title":"Enterprise Ontology: Theory and Methodology","year":"2006"},{"issue":"5","key":"key2022092113481421400_ref016","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/1125944. 1125976","article-title":"The deep structure of business processes","volume":"49","year":"2006","journal-title":"Communications of the ACM"},{"key":"key2022092113481421400_ref017","volume-title":"Architecture: Building Strategy into Design","year":"2008"},{"key":"key2022092113481421400_ref018","volume-title":"DEMOSL-3, DEMO Specification Language","year":"2017"},{"issue":"1","key":"key2022092113481421400_ref019","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1504\/IJODE.2013.053669","article-title":"The discipline of enterprise engineering","volume":"3","year":"2013","journal-title":"International Journal of Organisational Design and Engineering"},{"issue":"4","key":"key2022092113481421400_ref020","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1007\/s10796-015-9554-5","article-title":"Properties that inuence business process management maturity and its effect on organizational performance","volume":"18","year":"2016","journal-title":"Information Systems Frontiers"},{"key":"key2022092113481421400_ref021","volume-title":"Fundamentals of Business Process Management","year":"2018"},{"key":"key2022092113481421400_ref022","volume-title":"Feedback Control of Dynamic Systems (Second)","year":"1991"},{"key":"key2022092113481421400_ref023","first-page":"130","article-title":"Optimized execution of business processes on blockchain","year":"2017"},{"key":"key2022092113481421400_ref024","first-page":"651","article-title":"Challenges of meta access control model enforcement to an increased interoperability","volume-title":"Ency- Clopedia of Information Science and Technology","year":"2018","edition":"4th ed."},{"key":"key2022092113481421400_ref025","article-title":"Conceptualizing enterprise dynamic systems control for run-time business transactions","year":"2013"},{"key":"key2022092113481421400_ref026","volume-title":"A Logical Analysis of Information Systems: Static Aspects of the Data-Oriented Perspective","year":"1989"},{"key":"key2022092113481421400_ref027","article-title":"Handbook on architectures of information systems","volume-title":"Chap. Ch. 4 ORM\/NIAM Object Role Modeling","year":"1998"},{"issue":"1","key":"key2022092113481421400_ref028","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1111\/isj.12126","article-title":"Distilling a body of knowledge for information systems development","volume":"28","year":"2018","journal-title":"Information Systems Journal"},{"issue":"6","key":"key2022092113481421400_ref029","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1057\/ejis.2009.41","article-title":"Challenges associated with RFID tag implementations in supply chains","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"key2022092113481421400_ref030","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1287\/isre.1050.0063. eprint","article-title":"On data reliability assessment in accounting information systems","volume":"16","year":"2005","journal-title":"Information Systems Research"},{"key":"key2022092113481421400_ref031","volume-title":"Management Information Systems: Managing the Digital Firm","year":"2015"},{"key":"key2022092113481421400_ref032","first-page":"2884","article-title":"A dynamically stable single-wheeled mobile robot with inverse mouse-ball drive","year":"2006"},{"key":"key2022092113481421400_ref033","volume-title":"Business Process Orientation: Gaining the E-Business Competitive Advantage","year":"2001"},{"issue":"2","key":"key2022092113481421400_ref034","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1046\/j.1365-2575.2000.00075.x","article-title":"A conceptual framework for understanding business processes and business process modelling","volume":"10","year":"2000","journal-title":"Information Systems Journal"},{"issue":"1","key":"key2022092113481421400_ref035","article-title":"Digital Innovation Management: reinventing innovation management research in a digital world","volume":"41","year":"2017","journal-title":"MIS Quarterly"},{"issue":"6","key":"key2022092113481421400_ref036","doi-asserted-by":"crossref","first-page":"346","DOI":"10.17705\/1jais.00363","article-title":"Moving the work system theory forward","volume":"15","year":"2014","journal-title":"Journal of the Association for Information Systems"},{"issue":"5","key":"key2022092113481421400_ref037","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1057\/s41303-017-0049-y","article-title":"Balancing exploration and exploitation of IT resources: the inuence of Digital Business Intensity on perceived organizational performance","volume":"26","year":"2017","journal-title":"European Journal of Information Systems"},{"key":"key2022092113481421400_ref038","volume-title":"Business Process Model and Notation","author":"OMG","year":"2011"},{"key":"key2022092113481421400_ref039","volume-title":"Web Ontology Language Overview","author":"OWL","year":"2004"},{"issue":"4","key":"key2022092113481421400_ref040","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1057\/palgrave.ejis.3000513","article-title":"A research framework for analysing eBusiness models","volume":"13","year":"2004","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"key2022092113481421400_ref041","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1287\/isre.1060.0108. eprint","article-title":"Editorial Notes? The growth of interest in services management: opportunities for information systems scholars","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"issue":"4","key":"key2022092113481421400_ref042","first-page":"1","article-title":"Business process modeling-a comparative analysis","volume":"10","year":"2009","journal-title":"Journal of the Association for Information Systems"},{"issue":"5","key":"key2022092113481421400_ref043","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1057\/ejis.2010.38","article-title":"The ontological deficiencies of process modeling in practice","volume":"19","year":"2010","journal-title":"European Journal of Information Systems"},{"key":"key2022092113481421400_ref044","volume-title":"An\u00e1lise de sistemas lineares","year":"2002"},{"key":"key2022092113481421400_ref045","doi-asserted-by":"crossref","first-page":"77308","DOI":"10.1109\/ACCESS.2018.2881759","article-title":"Business process analytics and big data systems: a roadmap to bridge the gap","volume":"6","year":"2018","journal-title":"IEEE Access"},{"issue":"7","key":"key2022092113481421400_ref046","first-page":"1","article-title":"Digital options theory for IT capability investment","volume":"15","year":"2014","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"key2022092113481421400_ref047","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","year":"1996","journal-title":"Computer"},{"issue":"2","key":"key2022092113481421400_ref048","doi-asserted-by":"crossref","first-page":"305","DOI":"10.2307\/20721429","article-title":"A multi-project model OF key factors affecting Organizational benefits from enterprise systems","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"key":"key2022092113481421400_ref049","doi-asserted-by":"publisher","DOI":"10.1057\/ s41303-017-0039-0","article-title":"Design principles for sensemaking support systems in environmental sustainability transformations","year":"2017","journal-title":"European Journal of Information Systems"},{"issue":"5","key":"key2022092113481421400_ref050","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1108\/14637150810903084","article-title":"The impact of business process orientation on financial and non-financial performance","volume":"14","year":"2008","journal-title":"Business Process Management Journal"},{"issue":"5","key":"key2022092113481421400_ref051","first-page":"2","article-title":"Conceptualizing routing decisions in business processes: theoretical analysis and empirical testing","volume":"16","year":"2015","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"key2022092113481421400_ref052","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25750689","article-title":"User participation in information systems security risk management","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"9","key":"key2022092113481421400_ref053","doi-asserted-by":"crossref","first-page":"563","DOI":"10.17705\/1jais.00438","article-title":"Business process and information technology alignment: construct conceptualization, empirical illustration, and directions for future research","volume":"17","year":"2016","journal-title":"Journal of the Association for Information Systems"},{"issue":"11-12","key":"key2022092113481421400_ref054","first-page":"421","article-title":"The role of information technology in risk\/return relations of firms","volume":"5","year":"2004","journal-title":"Journal of the Association for Information Systems"},{"key":"key2022092113481421400_ref055","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","year":"2011"},{"issue":"4","key":"key2022092113481421400_ref056","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1057\/palgrave.jit.2000027","article-title":"Potential of Webservices to enable smart business networks","volume":"19","year":"2004","journal-title":"Journal of Information Technology"},{"issue":"6","key":"key2022092113481421400_ref057","doi-asserted-by":"crossref","first-page":"461","DOI":"10.17705\/1jais.00460","article-title":"Evaluating business process maturity models","volume":"18","year":"2017","journal-title":"Journal of the Association for Information Systems"},{"key":"key2022092113481421400_ref058","article-title":"Reconstructing the giant: on the importance of rigour in documenting the literature search process","volume":"161","year":"2009","journal-title":"ECIS 2009 Proceedings"},{"issue":"4","key":"key2022092113481421400_ref059","doi-asserted-by":"crossref","first-page":"407","DOI":"10.2307\/255139","article-title":"The history and status of general systems theory","volume":"15","year":"1972","journal-title":"Academy of Management Journal"},{"key":"key2022092113481421400_ref060","volume-title":"Ontological Foundations of Information Systems","year":"1997"},{"key":"key2022092113481421400_ref061","first-page":"329","article-title":"Untrusted business process monitoring and execution using blockchain","year":"2016"},{"key":"key2022092113481421400_ref062","first-page":"203","article-title":"A language\/action perspective on the design of cooperative work","year":"1986"}],"container-title":["Business Process Management Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/BPMJ-02-2020-0072\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/BPMJ-02-2020-0072\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:14:27Z","timestamp":1753398867000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/bpmj\/article\/27\/1\/24-54\/258698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,14]]},"references-count":62,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,7,14]]},"published-print":{"date-parts":[[2021,1,25]]}},"alternative-id":["10.1108\/BPMJ-02-2020-0072"],"URL":"https:\/\/doi.org\/10.1108\/bpmj-02-2020-0072","relation":{},"ISSN":["1463-7154"],"issn-type":[{"value":"1463-7154","type":"print"}],"subject":[],"published":{"date-parts":[[2020,7,14]]}}}