Skip to main content

History-Aware, Real-Time Risk Detection in Business Processes

  • Conference paper
On the Move to Meaningful Internet Systems: OTM 2011 (OTM 2011)

Abstract

This paper proposes a novel approach for identifying risks in executable business processes and detecting them at run-time. The approach considers risks in all phases of the business process management lifecycle, and is realized via a distributed, sensor-based architecture. At design-time, sensors are defined to specify risk conditions which when fulfilled, are a likely indicator of faults to occur. Both historical and current process execution data can be used to compose such conditions. At run-time, each sensor independently notifies a sensor manager when a risk is detected. In turn, the sensor manager interacts with the monitoring component of a process automation suite to prompt the results to the user who may take remedial actions. The proposed architecture has been implemented in the YAWL system and its performance has been evaluated in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albrecht, W.S., Albrecht, C.C., Albrecht, C.O.: Fraud Examination, 3rd edn. South-Western Publishing (2008)

    Google Scholar 

  2. Basel Committee on Bankin Supervision. Basel II - International Convergence of Capital Measurement and Capital Standards (2006)

    Google Scholar 

  3. Bhushan, N., Rai, K.: Strategic Decision Making: Applying the Analytic Hierarchy Process, 3rd edn. Springer, Heidelberg (2004)

    MATH  Google Scholar 

  4. International Electrotechnical Commission. IEC 61025 Fault Tree Analysis, FTA (1990)

    Google Scholar 

  5. Conforti, R., Fortino, G., La Rosa, M., ter Hofstede, A.H.M.: History-aware, real-time risk detection in business processes (extended version). QUT ePrints 42222, Queensland University of Technology (2011), http://eprints.qut.edu.au/42222

  6. Davis, R.B., Brabander, E.: ARIS Design Platform: Getting Started with BPM. Springer, Heidelberg (2007)

    Google Scholar 

  7. Dumas, M., van der Aalst, W.M.P., ter Hofstede, A.H.M.: Process-Aware Information Systems: Bridging People and Software through Process Technology. Wiley & Sons (2005)

    Google Scholar 

  8. Gambini, M., La Rosa, M., Migliorini, S., ter Hofstede, A.H.M.: Automated Error Correction of Business Process Models. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 148–165. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Gay, P., Pla, A., López, B., Meléndez, J., Meunier, R.: Service workflow monitoring through complex event processing. In: ETFA. IEEE (2010)

    Google Scholar 

  10. Goluch, G., Tjoa, S., Jakoubi, S., Quirchmayr, G.: Deriving resource requirements applying risk-aware business process modeling and simulation. In: ECIS. AISeL (2008)

    Google Scholar 

  11. Hermosillo, G., Seinturier, L., Duchien, L.: Using Complex Event Processing for Dynamic Business Process Adaptation. In: SCC. IEEE (2010)

    Google Scholar 

  12. Hespos, R., Strassmann, P.: Stochastic Decision Trees for the Analysis of Investment Decisions. Management Science 11(10) (1965)

    Google Scholar 

  13. ter Hofstede, A.H.M., van der Aalst, W.M.P., Adams, M., Russell, N.: Modern Business Process Automation: YAWL and its Support Environment. Springer, Heidelberg (2010)

    Book  Google Scholar 

  14. Hollingsworth, D.: The Workflow Reference Model. Workflow Management Coalition (1995)

    Google Scholar 

  15. Jakoubi, S., Tjoa, S.: A reference model for risk-aware business process management. In: CRiSIS. IEEE (2009)

    Google Scholar 

  16. Jakoubi, S., Tjoa, S., Goluch, S., Kitzler, G.: Risk-Aware Business Process Management: Establishing the Link Between Business and Security. In: Xhafa, F., et al. (eds.) Complex Intelligent Systems and Their Applications. Optimization and its Applications, vol. 41, pp. 109–135. Springer Science+Business Media, LLC (2010)

    Chapter  Google Scholar 

  17. Johnson, W.G.: MORT - The Management Oversight and Risk Tree. U.S. Atomic Energy Commission (1973)

    Google Scholar 

  18. Little, A., Best, P.: A framework for separation of duties in an sap r/3 environment. Managerial Auditing Journal 18(5), 419–430 (2003)

    Article  Google Scholar 

  19. Meyer, B.: Introduction to the theory of programming languages. Prentice-Hall (1990)

    Google Scholar 

  20. Neiger, D., Churilov, L., zur Muehlen, M., Rosemann, M.: Integrating risks in business process models with value focused process engineering. In: ECIS, AISeL (2006)

    Google Scholar 

  21. OMG. Business Process Model and Notation (BPMN) ver. 2.0 (January 2011), http://www.omg.org/spec/BPMN/2.0

  22. Oracle. BPEL Process Manager Developer’s Guide, http://download.oracle.com/docs/cd/E15523_01/integration.1111/e10224/bp_sensors.htm (accesssed June 2011)

  23. Rosemann, M., zur Muehlen, M.: Integrating risks in business process models. In: ACIS. AISeL (2005)

    Google Scholar 

  24. Smith, K.I., Everson, R.M., Fieldsend, J.E., Murphy, C., Misra, R.: Dominance-based multiobjective simulated annealing. IEEE Trans. on Evolutionary Computation 12(3) (2008)

    Google Scholar 

  25. Soldal Lund, M., Solhaug, B., Stolen, K.: Model-Driven Risk Analysis. Springer, Heidelberg (2011)

    Book  MATH  Google Scholar 

  26. Standards Australia and Standards New Zealand. Standard AS/NZS ISO 31000 (2009)

    Google Scholar 

  27. Sybase. Sybase CEP Implementation Methodology for Continuous Intelligence, http://www.sybase.com.au/files/White_Papers/Sybase_CEP_Implementation_Methodology_wp.pdf (accessed June 2011)

  28. Tjoa, S., Jakoubi, S., Quirchmayr, G.: Enhancing business impact analysis and risk assessment applying a risk-aware business process modeling and simulation methodology. In: ARES, pp. 179–186. IEEE Computer Society (2008)

    Google Scholar 

  29. van Dongen, B.F., Crooy, R.A., van der Aalst, W.M.P.: Cycle Time Prediction: When Will This Case Finally Be Finished? In: Chung, S. (ed.) OTM 2008, Part I. LNCS, vol. 5331, pp. 319–336. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  30. Voluntary Interindustry Commerce Solutions Association. Voluntary Inter-industry Commerce Standard (VICS), http://www.vics.org (accessed June 2011)

  31. Wang, D., Rundensteiner, E.A., Ellison, R.T., Wang, H.: Active complex event processing infrastructure: Monitoring and reacting to event streams. In: ICDEW. IEEE (2011)

    Google Scholar 

  32. zur Mühlen, M., Ho, D.T.-Y.: Risk Management in the BPM Lifecycle. In: Bussler, C.J., Haller, A. (eds.) BPM 2005. LNCS, vol. 3812, pp. 454–466. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Conforti, R., Fortino, G., La Rosa, M., ter Hofstede, A.H.M. (2011). History-Aware, Real-Time Risk Detection in Business Processes. In: Meersman, R., et al. On the Move to Meaningful Internet Systems: OTM 2011. OTM 2011. Lecture Notes in Computer Science, vol 7044. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25109-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25109-2_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25108-5

  • Online ISBN: 978-3-642-25109-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics