PRISM - A Predictive Risk Monitoring Approach for Business Processes

Nowadays, organizations face severe operational risks when executing their business processes. Some reasons are the ever more complex and dynamic business environment as well as the organic nature of business processes. Taking a risk perspective on the business process management (BPM) lifecycle has thus been recognized as an essential research stream. Despite profound knowledge on risk-aware BPM with a focus on process design, existing approaches for real-time risk monitoring treat instances as isolated when detecting risks. They do not propagate risk information to other instances in order to support early risk detection. To address this gap, we propose an approach for predictive risk monitoring (PRISM). This approach automatically propagates risk information, which has been detected via risk sensors, across similar running instances of the same process in real-time. We demonstrate PRISM’s capability of predictive risk monitoring by applying it in the context of a real-world scenario.

[1]  Hervé Pingaud,et al.  Business Process and Risk Models Enrichment: Considerations for Business Intelligence , 2008, 2008 IEEE International Conference on e-Business Engineering.

[2]  Peter Loos,et al.  Prescriptive Control of Business Processes , 2015, Business & Information Systems Engineering.

[3]  Carla Wilkin,et al.  Formalizing process-based risk with Value-Focused Process Engineering , 2011, Inf. Syst. E Bus. Manag..

[4]  Arthur H. M. ter Hofstede,et al.  Filtering Out Infrequent Behavior from Business Process Event Logs , 2017, IEEE Transactions on Knowledge and Data Engineering.

[5]  Daniel Beverungen,et al.  Exploring the Interplay of the Design and Emergence of Business Processes as Organizational Routines , 2014, Business & Information Systems Engineering.

[6]  Maximilian Röglinger,et al.  Inspection Coming Due! How to Determine the Service Interval of Your Processes! , 2015, BPM.

[7]  P. Jaccard THE DISTRIBUTION OF THE FLORA IN THE ALPINE ZONE.1 , 1912 .

[8]  Wil M. P. van der Aalst,et al.  A recommendation system for predicting risks across multiple business process instances , 2015, Decis. Support Syst..

[9]  Stefanie Betz,et al.  Risk-Aware Business Process Modeling and Simulation Using XML Nets , 2011, 2011 IEEE 13th Conference on Commerce and Enterprise Computing.

[10]  Jan Mendling,et al.  The State of the Art of Business Process Management Research as Published in the BPM Conference , 2015, Business & Information Systems Engineering.

[11]  Ralf Mock,et al.  Risk analysis of information systems by event process chains , 2005, Int. J. Crit. Infrastructures.

[12]  João Souza Neto,et al.  Metamodel of the it governance framework COBIT , 2013 .

[13]  James H. Lambert,et al.  Integration of risk identification with business process models , 2006, Syst. Eng..

[14]  Maximilian Röglinger,et al.  Value Orientation in Process Management , 2011, Bus. Inf. Syst. Eng..

[15]  Mary S. Schaeffer,et al.  Sarbanes-Oxley Act of 2002 , 2012 .

[16]  Kay Römer,et al.  makeSense: Real-world Business Processes through Wireless Sensor Networks , 2013, CONET/UBICITEC.

[17]  John Mylopoulos,et al.  Business Process-Based Regulation Compliance: The Case of the Sarbanes-Oxley Act , 2007, 15th IEEE International Requirements Engineering Conference (RE 2007).

[18]  Ralph Bergmann,et al.  Case-based adaptation of workflows , 2014, Inf. Syst..

[19]  Wil M. P. van der Aalst,et al.  Root Cause Analysis with Enriched Process Logs , 2012, Business Process Management Workshops.

[20]  Moe Thandar Wynn,et al.  Predicting Deadline Transgressions Using Event Logs , 2012, Business Process Management Workshops.

[21]  Abraham Bernstein,et al.  Signal/Collect: Graph Algorithms for the (Semantic) Web , 2010, SEMWEB.

[22]  Jan Recker,et al.  Real-time risk monitoring in business processes: A sensor-based approach , 2013, J. Syst. Softw..

[23]  Marlon Dumas,et al.  Diagnosing behavioral differences between business process models: An approach based on event structures , 2016, Inf. Syst..

[24]  P. Sarbanes,et al.  Sarbanes-Oxley Act of 2002 , 2002 .

[25]  Wil M. P. van der Aalst,et al.  Trace Clustering in Process Mining , 2008, Business Process Management Workshops.

[26]  M. Rosemann,et al.  Integrating Risks in Business Process Models , 2005 .

[27]  Claudio Bartolini,et al.  Next Best Step and Expert Recommendation for Collaborative Processes in IT Service Management , 2011, BPM.

[28]  Stephen S. Yau,et al.  A Risk Reduction Framework for Dynamic Workflows , 2008, 2008 IEEE International Conference on Services Computing.

[29]  Moe Thandar Wynn,et al.  Current Research in Risk-aware Business Process Management - Overview, Comparison, and Gap Analysis , 2014, Commun. Assoc. Inf. Syst..

[30]  Daniela Grigori,et al.  Process Analytics - Concepts and Techniques for Querying and Analyzing Process Data , 2016 .

[31]  Wineke A. M. van Lent,et al.  Similarity of business process models : metrics and evaluation , 2009 .

[32]  W.M.P. van der Aalst,et al.  Business Process Management: A Comprehensive Survey , 2013 .

[33]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .

[34]  Arthur H. M. ter Hofstede,et al.  Automated Risk Mitigation in Business Processes , 2012, OTM Conferences.

[35]  Marlon Dumas,et al.  Log Delta Analysis: Interpretable Differencing of Business Process Event Logs , 2015, BPM.

[36]  Marcello La Rosa,et al.  Filtering out Infrequent Behavior from Process Event Logs , 2015 .

[37]  Manuel Bolsinger,et al.  Bringing value-based business process management to the operational process level , 2015, Inf. Syst. E Bus. Manag..

[38]  N. Pletneva COMMENTARY ON THE INTERNATIONAL STANDARD ISO 31000–2009 “RISK MANAGEMENT. PRINCIPLES AND GUIDELINES” , 2014 .

[39]  Mathias Weske,et al.  Isotactics as a Foundation for Alignment and Abstraction of Behavioral Models , 2012, BPM.

[40]  Remco M. Dijkman,et al.  Measuring Similarity between Business Process Models , 2008, CAiSE.

[41]  Gerald Quirchmayr,et al.  Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation , 2008, ECIS.