PRISM - A Predictive Risk Monitoring Approach for Business Processes
暂无分享,去创建一个
Raffaele Conforti | Maximilian Röglinger | Jonas Manderscheid | Sven Fink | R. Conforti | J. Manderscheid | Maximilian Röglinger | Sven Fink
[1] Hervé Pingaud,et al. Business Process and Risk Models Enrichment: Considerations for Business Intelligence , 2008, 2008 IEEE International Conference on e-Business Engineering.
[2] Peter Loos,et al. Prescriptive Control of Business Processes , 2015, Business & Information Systems Engineering.
[3] Carla Wilkin,et al. Formalizing process-based risk with Value-Focused Process Engineering , 2011, Inf. Syst. E Bus. Manag..
[4] Arthur H. M. ter Hofstede,et al. Filtering Out Infrequent Behavior from Business Process Event Logs , 2017, IEEE Transactions on Knowledge and Data Engineering.
[5] Daniel Beverungen,et al. Exploring the Interplay of the Design and Emergence of Business Processes as Organizational Routines , 2014, Business & Information Systems Engineering.
[6] Maximilian Röglinger,et al. Inspection Coming Due! How to Determine the Service Interval of Your Processes! , 2015, BPM.
[7] P. Jaccard. THE DISTRIBUTION OF THE FLORA IN THE ALPINE ZONE.1 , 1912 .
[8] Wil M. P. van der Aalst,et al. A recommendation system for predicting risks across multiple business process instances , 2015, Decis. Support Syst..
[9] Stefanie Betz,et al. Risk-Aware Business Process Modeling and Simulation Using XML Nets , 2011, 2011 IEEE 13th Conference on Commerce and Enterprise Computing.
[10] Jan Mendling,et al. The State of the Art of Business Process Management Research as Published in the BPM Conference , 2015, Business & Information Systems Engineering.
[11] Ralf Mock,et al. Risk analysis of information systems by event process chains , 2005, Int. J. Crit. Infrastructures.
[12] João Souza Neto,et al. Metamodel of the it governance framework COBIT , 2013 .
[13] James H. Lambert,et al. Integration of risk identification with business process models , 2006, Syst. Eng..
[14] Maximilian Röglinger,et al. Value Orientation in Process Management , 2011, Bus. Inf. Syst. Eng..
[15] Mary S. Schaeffer,et al. Sarbanes-Oxley Act of 2002 , 2012 .
[16] Kay Römer,et al. makeSense: Real-world Business Processes through Wireless Sensor Networks , 2013, CONET/UBICITEC.
[17] John Mylopoulos,et al. Business Process-Based Regulation Compliance: The Case of the Sarbanes-Oxley Act , 2007, 15th IEEE International Requirements Engineering Conference (RE 2007).
[18] Ralph Bergmann,et al. Case-based adaptation of workflows , 2014, Inf. Syst..
[19] Wil M. P. van der Aalst,et al. Root Cause Analysis with Enriched Process Logs , 2012, Business Process Management Workshops.
[20] Moe Thandar Wynn,et al. Predicting Deadline Transgressions Using Event Logs , 2012, Business Process Management Workshops.
[21] Abraham Bernstein,et al. Signal/Collect: Graph Algorithms for the (Semantic) Web , 2010, SEMWEB.
[22] Jan Recker,et al. Real-time risk monitoring in business processes: A sensor-based approach , 2013, J. Syst. Softw..
[23] Marlon Dumas,et al. Diagnosing behavioral differences between business process models: An approach based on event structures , 2016, Inf. Syst..
[24] P. Sarbanes,et al. Sarbanes-Oxley Act of 2002 , 2002 .
[25] Wil M. P. van der Aalst,et al. Trace Clustering in Process Mining , 2008, Business Process Management Workshops.
[26] M. Rosemann,et al. Integrating Risks in Business Process Models , 2005 .
[27] Claudio Bartolini,et al. Next Best Step and Expert Recommendation for Collaborative Processes in IT Service Management , 2011, BPM.
[28] Stephen S. Yau,et al. A Risk Reduction Framework for Dynamic Workflows , 2008, 2008 IEEE International Conference on Services Computing.
[29] Moe Thandar Wynn,et al. Current Research in Risk-aware Business Process Management - Overview, Comparison, and Gap Analysis , 2014, Commun. Assoc. Inf. Syst..
[30] Daniela Grigori,et al. Process Analytics - Concepts and Techniques for Querying and Analyzing Process Data , 2016 .
[31] Wineke A. M. van Lent,et al. Similarity of business process models : metrics and evaluation , 2009 .
[32] W.M.P. van der Aalst,et al. Business Process Management: A Comprehensive Survey , 2013 .
[33] Richard W. Hamming,et al. Error detecting and error correcting codes , 1950 .
[34] Arthur H. M. ter Hofstede,et al. Automated Risk Mitigation in Business Processes , 2012, OTM Conferences.
[35] Marlon Dumas,et al. Log Delta Analysis: Interpretable Differencing of Business Process Event Logs , 2015, BPM.
[36] Marcello La Rosa,et al. Filtering out Infrequent Behavior from Process Event Logs , 2015 .
[37] Manuel Bolsinger,et al. Bringing value-based business process management to the operational process level , 2015, Inf. Syst. E Bus. Manag..
[38] N. Pletneva. COMMENTARY ON THE INTERNATIONAL STANDARD ISO 31000–2009 “RISK MANAGEMENT. PRINCIPLES AND GUIDELINES” , 2014 .
[39] Mathias Weske,et al. Isotactics as a Foundation for Alignment and Abstraction of Behavioral Models , 2012, BPM.
[40] Remco M. Dijkman,et al. Measuring Similarity between Business Process Models , 2008, CAiSE.
[41] Gerald Quirchmayr,et al. Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation , 2008, ECIS.