Browse Definitions :
Definition

dynamic case management (DCM)

Contributor(s): Anne Stuart
This definition is part of our Essential Guide: Enterprise architect's guide to optimal BPM workflow

Dynamic case management (DCM) is the handling of case-related work through the use of technologies that automate and streamline aspects of each case. In this context, a case is a collection of information about a particular instance of something, such as a person, company, incident or problem.

DCM — sometimes called “advanced case management” (ACM) -- is a both a human- and a technology-based approach that is driven by incoming events. These events change the context of the information, requiring responses from caseworkers or other knowledge workers. DCM’s ultimate goal is helping such workers make faster, better and more accurate decisions.

DCM is similar to business process management (BPM) in that it works to improve task management and workflow. However, while BPM focuses on the complete definition and control of structured, repeated processes, DCM works on an ad hoc basis to manage dynamic, unstructured processes. In fact, DCM can be especially effective for companies handling “untamed” business processes that lack structure or add no value. It’s also increasingly used to enhance collaboration and improve compliance activities. Initially used primarily in healthcare, insurance and similar industries, DCM is now moving into many other fields as well.

 

Continue reading about dynamic case management (DCM):

 > ebizQ Guide: Use DCM to battle untamed processes

 > Reality check: Debunking myths and misconceptions about DCM

 > Forrester Analyst Jam Session: Dynamic Case Management: An Old Idea Catches New Fire (video)

This was last updated in February 2012

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Hi there,
In some articles I have read about differences between dynamic case management and case management.
I think there is some kind of maturity in DCM and i would like to know more about them
please someone explains the differences to me
Thanks
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close