Abstract
This paper proposes a novel approach for identifying risks in executable business processes and detecting them at run-time. The approach considers risks in all phases of the business process management lifecycle, and is realized via a distributed, sensor-based architecture. At design-time, sensors are defined to specify risk conditions which when fulfilled, are a likely indicator of faults to occur. Both historical and current process execution data can be used to compose such conditions. At run-time, each sensor independently notifies a sensor manager when a risk is detected. In turn, the sensor manager interacts with the monitoring component of a process automation suite to prompt the results to the user who may take remedial actions. The proposed architecture has been implemented in the YAWL system and its performance has been evaluated in practice.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Albrecht, W.S., Albrecht, C.C., Albrecht, C.O.: Fraud Examination, 3rd edn. South-Western Publishing (2008)
Basel Committee on Bankin Supervision. Basel II - International Convergence of Capital Measurement and Capital Standards (2006)
Bhushan, N., Rai, K.: Strategic Decision Making: Applying the Analytic Hierarchy Process, 3rd edn. Springer, Heidelberg (2004)
International Electrotechnical Commission. IEC 61025 Fault Tree Analysis, FTA (1990)
Conforti, R., Fortino, G., La Rosa, M., ter Hofstede, A.H.M.: History-aware, real-time risk detection in business processes (extended version). QUT ePrints 42222, Queensland University of Technology (2011), http://eprints.qut.edu.au/42222
Davis, R.B., Brabander, E.: ARIS Design Platform: Getting Started with BPM. Springer, Heidelberg (2007)
Dumas, M., van der Aalst, W.M.P., ter Hofstede, A.H.M.: Process-Aware Information Systems: Bridging People and Software through Process Technology. Wiley & Sons (2005)
Gambini, M., La Rosa, M., Migliorini, S., ter Hofstede, A.H.M.: Automated Error Correction of Business Process Models. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 148–165. Springer, Heidelberg (2011)
Gay, P., Pla, A., López, B., Meléndez, J., Meunier, R.: Service workflow monitoring through complex event processing. In: ETFA. IEEE (2010)
Goluch, G., Tjoa, S., Jakoubi, S., Quirchmayr, G.: Deriving resource requirements applying risk-aware business process modeling and simulation. In: ECIS. AISeL (2008)
Hermosillo, G., Seinturier, L., Duchien, L.: Using Complex Event Processing for Dynamic Business Process Adaptation. In: SCC. IEEE (2010)
Hespos, R., Strassmann, P.: Stochastic Decision Trees for the Analysis of Investment Decisions. Management Science 11(10) (1965)
ter Hofstede, A.H.M., van der Aalst, W.M.P., Adams, M., Russell, N.: Modern Business Process Automation: YAWL and its Support Environment. Springer, Heidelberg (2010)
Hollingsworth, D.: The Workflow Reference Model. Workflow Management Coalition (1995)
Jakoubi, S., Tjoa, S.: A reference model for risk-aware business process management. In: CRiSIS. IEEE (2009)
Jakoubi, S., Tjoa, S., Goluch, S., Kitzler, G.: Risk-Aware Business Process Management: Establishing the Link Between Business and Security. In: Xhafa, F., et al. (eds.) Complex Intelligent Systems and Their Applications. Optimization and its Applications, vol. 41, pp. 109–135. Springer Science+Business Media, LLC (2010)
Johnson, W.G.: MORT - The Management Oversight and Risk Tree. U.S. Atomic Energy Commission (1973)
Little, A., Best, P.: A framework for separation of duties in an sap r/3 environment. Managerial Auditing Journal 18(5), 419–430 (2003)
Meyer, B.: Introduction to the theory of programming languages. Prentice-Hall (1990)
Neiger, D., Churilov, L., zur Muehlen, M., Rosemann, M.: Integrating risks in business process models with value focused process engineering. In: ECIS, AISeL (2006)
OMG. Business Process Model and Notation (BPMN) ver. 2.0 (January 2011), http://www.omg.org/spec/BPMN/2.0
Oracle. BPEL Process Manager Developer’s Guide, http://download.oracle.com/docs/cd/E15523_01/integration.1111/e10224/bp_sensors.htm (accesssed June 2011)
Rosemann, M., zur Muehlen, M.: Integrating risks in business process models. In: ACIS. AISeL (2005)
Smith, K.I., Everson, R.M., Fieldsend, J.E., Murphy, C., Misra, R.: Dominance-based multiobjective simulated annealing. IEEE Trans. on Evolutionary Computation 12(3) (2008)
Soldal Lund, M., Solhaug, B., Stolen, K.: Model-Driven Risk Analysis. Springer, Heidelberg (2011)
Standards Australia and Standards New Zealand. Standard AS/NZS ISO 31000 (2009)
Sybase. Sybase CEP Implementation Methodology for Continuous Intelligence, http://www.sybase.com.au/files/White_Papers/Sybase_CEP_Implementation_Methodology_wp.pdf (accessed June 2011)
Tjoa, S., Jakoubi, S., Quirchmayr, G.: Enhancing business impact analysis and risk assessment applying a risk-aware business process modeling and simulation methodology. In: ARES, pp. 179–186. IEEE Computer Society (2008)
van Dongen, B.F., Crooy, R.A., van der Aalst, W.M.P.: Cycle Time Prediction: When Will This Case Finally Be Finished? In: Chung, S. (ed.) OTM 2008, Part I. LNCS, vol. 5331, pp. 319–336. Springer, Heidelberg (2008)
Voluntary Interindustry Commerce Solutions Association. Voluntary Inter-industry Commerce Standard (VICS), http://www.vics.org (accessed June 2011)
Wang, D., Rundensteiner, E.A., Ellison, R.T., Wang, H.: Active complex event processing infrastructure: Monitoring and reacting to event streams. In: ICDEW. IEEE (2011)
zur Mühlen, M., Ho, D.T.-Y.: Risk Management in the BPM Lifecycle. In: Bussler, C.J., Haller, A. (eds.) BPM 2005. LNCS, vol. 3812, pp. 454–466. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Conforti, R., Fortino, G., La Rosa, M., ter Hofstede, A.H.M. (2011). History-Aware, Real-Time Risk Detection in Business Processes. In: Meersman, R., et al. On the Move to Meaningful Internet Systems: OTM 2011. OTM 2011. Lecture Notes in Computer Science, vol 7044. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25109-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-25109-2_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25108-5
Online ISBN: 978-3-642-25109-2
eBook Packages: Computer ScienceComputer Science (R0)