Abstract
Process mining makes it possible to solve a task of finding and analyzing deviations in the process. System event logs record information about real process behavior. Weaknesses and errors of a workflow can be found during the analysis of logs. This is especially important in areas associated with significant responsibility and risk.
In this paper the focus is on the criminal procedure analysis via process mining methods. A model of this process allows for flexibility only in a strictly regulated framework. However, in practice undesired deviations appear and, therefore, need to be detected and prevented.
We adopted conformance checking techniques to determine the anomaly of the trace, taking into account the specifics of the process. We also did clustering of anomaly cases to reveal behavior patterns. They will be helpful for identification of potential causes of such anomalies.
This work is supported by the Basic Research Program at the National Research University Higher School of Economics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19345-3
Carmona, J., van Dongen, B., Solti, A., Weidlich, M.: Conformance Checking. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99414-7
Abdulla, P.A., Mayr, R.: Petri nets with time and cost. In: Atig, M.F., Rezine, A. (eds.) 14th International Workshop on Verification of Infinite-State Systems, pp. 9–24 (2013)
Begicheva, A., Lomazova, I.: Checking conformance of high-level business process models to event logs. In: 8th Spring/Summer Young Researchers’ Colloquium on Software Engineering, Saint Petersburg, pp. 77–82 (2014)
Bérard, B., Cassez, F., Haddad, S., Lime, D., Roux, O.H.: Comparison of different semantics for time Petri nets. In: Peled, D.A., Tsay, Y.-K. (eds.) ATVA 2005. LNCS, vol. 3707, pp. 293–307. Springer, Heidelberg (2005). https://doi.org/10.1007/11562948_23
Chang, W., Lu, C.C., Jen, W.Y.: A study of integrated criminal justice data base system. In: 2008 IEEE International Conference on Intelligence and Security Informatics, pp. 290–291. IEEE (2008)
van Dijk, J., Kalidien, S., Choenni, S.: Smart monitoring of the criminal justice system. Gov. Inf. Q. 35(4), S24–S32 (2016)
Doan, A., Halevy, A., Ives, Z.: Principles of Data Integration. Morgan Kaufmann, Burlington (2012)
Driessen, R.: The usability of the Process Mining analysis method to improve processes of the Netherlands Ministry of Defence. Delft University of Technology (2017)
Lanz, A., Weber, B., Reichert, M.: Time patterns for process-aware information systems. Requirements Eng. 2(19), 113–141 (2014)
Mapikou, G.L.M., Etoundi, R.A.: A process mining oriented approach to improve process models analysis in developing countries. In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), pp. 1–8. IEEE (2016)
Paneyakh, E., Titaev, K., Shklyaruk, M.: Trajectory of a Criminal Case: Institutional Analysis of Russian Criminal Justice System. EUSP Press, Saint Petersburg (2018)
Poelmans, J., Elzinga, P., Viaene, S., Dedene, G.: Formally analysing the concepts of domestic violence. Expert Syst. Appl. 38(4), 3116–3130 (2011)
Popova-Zeugmann, L.: Time and Petri Nets. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41115-1
Rojas, E., Munoz-Gama, J., Sepúlveda, M., Capurro, D.: Process mining in healthcare: a literature review. J. Biomed. Inform. 61, 224–236 (2016)
Rozinat, A.: Process mining: conformance and extension. Technische Universiteit Eindhoven (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
See Table 3.
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Kolosova, A.A., Lomazova, I.A. (2019). Detection of Anomalies in the Criminal Proceedings Based on the Analysis of Event Logs. In: van der Aalst, W., et al. Analysis of Images, Social Networks and Texts. AIST 2019. Lecture Notes in Computer Science(), vol 11832. Springer, Cham. https://doi.org/10.1007/978-3-030-37334-4_36
Download citation
DOI: https://doi.org/10.1007/978-3-030-37334-4_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37333-7
Online ISBN: 978-3-030-37334-4
eBook Packages: Computer ScienceComputer Science (R0)