Analysis of information quality requirements in business processes, revisited

AbstractMany business processes (BPs) involving critical decision-making activities require good-quality information for their successful enactment. Despite this fact, existing BP approaches focus on control flow and ignore the complementary information perspective, or simply treat it as a technical issue, rather than a social and organizational one. To tackle this problem, we propose a comprehensive framework for modeling and analyzing information quality requirements for business processes using the WFA-net BP modeling language. In addition, we describe a prototype implementation and present two realistic examples concerning the stock market domain, intended to illustrate our approach .

[1]  Santhosh Kumaran,et al.  On the Duality of Information-Centric and Activity-Centric Models of Business Processes , 2008, CAiSE.

[2]  Chris Rose The Flash Crash Of May 2010: Accident Or Market Manipulation? , 2011 .

[3]  Joseph Moses Juran,et al.  Quality-control handbook , 1951 .

[4]  Richard Y. Wang,et al.  Anchoring data quality dimensions in ontological foundations , 1996, CACM.

[5]  Frederic S. Mishkin Policy Remedies for Conflicts of Interest in the Financial System , 2003 .

[6]  Per Runeson,et al.  Guidelines for conducting and reporting case study research in software engineering , 2009, Empirical Software Engineering.

[7]  Wil M. P. van der Aalst,et al.  Data-Flow Anti-patterns: Discovering Data-Flow Errors in Workflows , 2009, CAiSE.

[8]  Hans Eriksson,et al.  Business Modeling With UML: Business Patterns at Work , 2000 .

[9]  Natalia Sidorova,et al.  Analyzing control-flow and data-flow in workflow processes in a unified way , 2008 .

[10]  Diego Calvanese,et al.  Artifact-Centric Workflow Dominance , 2009, ICSOC/ServiceWave.

[11]  Carlo Batini,et al.  Data Quality: Concepts, Methodologies and Techniques , 2006, Data-Centric Systems and Applications.

[12]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .

[13]  Mario Piattini,et al.  Capturing data quality requirements for web applications by means of DQ_WebRE , 2013, Inf. Syst. Frontiers.

[14]  Thomas Redman,et al.  Data quality for the information age , 1996 .

[15]  Liping Liu,et al.  Evolutional Data Quality: A Theory-Specific View , 2002, ICIQ.

[16]  A. Kyle,et al.  The Flash Crash: The Impact of High Frequency Trading on an Electronic Market , 2011 .

[17]  Richard Y. Wang,et al.  Modeling Information Manufacturing Systems to Determine Information Product Quality Management Scien , 1998 .

[18]  Thomas H. Mcinish,et al.  Strategic Liquidity Supply in a Market with Fast and Slow Traders , 2012 .

[19]  Diane M. Strong,et al.  Beyond Accuracy: What Data Quality Means to Data Consumers , 1996, J. Manag. Inf. Syst..

[20]  T. Redman Improve Data Quality for Competitive Advantage , 1995 .

[21]  Irene Aldridge,et al.  High-frequency Trading High-frequency Trading Industry Strategy Project Engineering Leadership Program , 2022 .

[22]  Elisa Bertino,et al.  An Approach to Evaluate Data Trustworthiness Based on Data Provenance , 2008, Secure Data Management.

[23]  Angélica Caro,et al.  An Approach To Design Business Processes Addressing Data Quality Issues , 2013, ECIS.

[24]  Hans-Erik Eriksson,et al.  Business Modeling with UML , 2001 .

[25]  Maria E. Orlowska,et al.  Data Flow and Validation in Workflow Modelling , 2004, ADC.

[26]  Manfred Reichert,et al.  Flexibility in Process-Aware Information Systems , 2009, Trans. Petri Nets Other Model. Concurr..

[27]  Joseph A. Petrick,et al.  The Enron Scandal and the Neglect of Management Integrity Capacity , 2003 .

[28]  Pnina Soffer,et al.  Mirror, Mirror on the Wall, Can I Count on You at All? Exploring Data Inaccuracy in Business Processes , 2010, BMMDS/EMMSAD.

[29]  Martin Bichler,et al.  Design science in information systems research , 2006, Wirtschaftsinf..

[30]  M. Lewis Flash Boys: A Wall Street Revolt , 2014 .

[31]  Paolo Giorgini,et al.  Dealing with Information Quality Requirements , 2015, BMMDS/EMMSAD.

[32]  Paolo Giorgini,et al.  Modeling and Analyzing Information Integrity in Safety Critical Systems , 2013, CAiSE Workshops.

[33]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[34]  Paolo Giorgini,et al.  Analyzing Trust Requirements in Socio-Technical Systems: A Belief-Based Approach , 2015, PoEM.

[35]  Richard Hull,et al.  Business Artifacts: A Data-centric Approach to Modeling Business Operations and Processes , 2009, IEEE Data Eng. Bull..

[36]  Andrea C. Arpaci-Dusseau,et al.  Analysis and Evolution of Journaling File Systems , 2005, USENIX Annual Technical Conference, General Track.

[37]  Ernst W. Biersack Performance evaluation of Forward Error Correction in ATM networks , 1992, SIGCOMM 1992.

[38]  Ilia Bider,et al.  Enterprise, Business-Process and Information Systems Modeling , 2014, Lecture Notes in Business Information Processing.

[39]  Yogesh L. Simmhan,et al.  A survey of data provenance in e-science , 2005, SGMD.

[40]  Yijun Yu,et al.  Requirements-Driven Design and Configuration Management of Business Processes , 2007, BPM.

[41]  Barbara Pernici,et al.  IP-UML: Towards a Methodology for Quality Improvement Based on the IP-MAP Framework , 2002, ICIQ.

[42]  Richard Y. Wang,et al.  IP-MAP: Representing the Manufacture of an Information Product , 2000, IQ.

[43]  Paolo Giorgini,et al.  A goal-based approach for automated specification of Information Quality policies , 2015, 2015 IEEE 9th International Conference on Research Challenges in Information Science (RCIS).

[44]  Paolo Giorgini,et al.  Modeling and Reasoning About Information Quality Requirements , 2015, REFSQ.

[45]  Nicola Zannone A requirements engineering methodology for trust, security, and privacy , 2007 .

[46]  Richard Y. Wang,et al.  Data quality assessment , 2002, CACM.

[47]  William M. K. Trochim,et al.  Research methods knowledge base , 2001 .

[48]  Alin Deutsch,et al.  Automatic verification of data-centric business processes , 2009, ICDT '09.

[49]  Wil M. P. van der Aalst,et al.  Workflow Data Patterns: Identification, Representation and Tool Support , 2005, ER.

[50]  Ruth Sara Aguilar-Savén,et al.  Business process modelling: Review and framework , 2004 .

[51]  Kai Zimmermann,et al.  The Effect of Single-Stock Circuit Breakers on the Quality of Fragmented Markets , 2012, FinanceCom.

[52]  Sean Quinlan,et al.  Venti: A New Approach to Archival Storage , 2002, FAST.

[53]  Jianwen Su,et al.  Enforcing Constraints on Life Cycles of Business Artifacts , 2009, 2009 Third IEEE International Symposium on Theoretical Aspects of Software Engineering.

[54]  Avanidhar Subrahmanyam,et al.  Algorithmic trading, the Flash Crash, and coordinated circuit breakers , 2013 .

[55]  Donald P. Ballou,et al.  Modeling Data and Process Quality in Multi-Input, Multi-Output Information Systems , 1985 .

[56]  John Mylopoulos,et al.  From E-R to "A-R" - Modelling Strategic Actor Relationships for Business Process Reengineering , 1994, ER.

[57]  Don A. Moore,et al.  Conflicts Of Interest And The Case Of Auditor Independence: Moral Seduction And Strategic Issue Cycling , 2006 .

[58]  Radu Calinescu,et al.  Large-scale complex IT systems , 2011, Commun. ACM.

[59]  Paolo Giorgini,et al.  Detecting Conflicts in Information Quality Requirements: the May 6, 2010 Flash Crash , 2014 .

[60]  Aneesh Krishna,et al.  Combined Approach for Supporting the Business Process Model Lifecycle , 2006, PACIS.

[61]  J. Sobolewski Cyclic redundancy check , 2003 .

[62]  Carlo Combi,et al.  Flaws in the Flow: The Weakness of Unstructured Business Process Modeling Languages Dealing with Data , 2009, OTM Conferences.

[63]  Wil M. P. van der Aalst,et al.  The Application of Petri Nets to Workflow Management , 1998, J. Circuits Syst. Comput..

[64]  L. M. Cysneiros Addressing Agent Autonomy in Business Process Management-With Case Studies on the Patient Discharge Process , 2004 .

[65]  Jianwen Su,et al.  Separating Execution and Data Management: A Key to Business-Process-as-a-Service (BPaaS) , 2014, BPM.

[66]  Mathias Weske,et al.  Case handling: a new paradigm for business process support , 2005, Data Knowl. Eng..

[67]  Fred Cohen A cryptographic checksum for integrity protection , 1987, Comput. Secur..

[68]  Paolo Giorgini,et al.  Modeling and Reasoning about Information Quality Requirements in Business Processes , 2015, BMMDS/EMMSAD.

[69]  Craig W. Fisher,et al.  Criticality of data quality as exemplified in two disasters , 2001, Inf. Manag..

[70]  R. P. Srivastava,et al.  A conceptual framework and belief‐function approach to assessing overall information quality , 2003, Int. J. Intell. Syst..

[71]  Natalia Sidorova,et al.  Workflow Soundness Revisited: Checking Correctness in the Presence of Data While Staying Conceptual , 2010, CAiSE.

[72]  Fausto Giunchiglia,et al.  Tropos: An Agent-Oriented Software Development Methodology , 2004, Autonomous Agents and Multi-Agent Systems.

[73]  Jianwen Su,et al.  A Data-Centric Design Methodology for Business Processes , 2009, Handbook of Research on Business Process Modeling.

[74]  Eric Yu,et al.  Modeling Strategic Relationships for Process Reengineering , 1995, Social Modeling for Requirements Engineering.

[75]  Jianwen Su,et al.  Modeling data for business processes , 2014, 2014 IEEE 30th International Conference on Data Engineering.

[76]  C. Holden,et al.  The Breakdown of Standard Microstructure Techniques: And What to Do About it , 2011 .

[77]  Richard Y. Wang,et al.  A product perspective on total data quality management , 1998, CACM.

[78]  V. Vianu,et al.  Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .