Toward Resilience Assessment in Business Process Architectures

This paper investigates options to access the resilience of business process architectures, thereby connecting the two hitherto unconnected areas of Business Process Management and Information System Resilience. The overarching goal is to provide for robust and reliable business process execution even under adverse and unexpected situations. Specifically, this paper focuses on one particular resilience indicator as a basis for assessment, namely time. This is because timeliness and time behavior of activities in business processes directly mirror effects and impacts of a changing environment on the business process. We develop an approach based on process mining to analyze the event logs generated during the execution of processes which extract probability distributions of a process’s time behavior to model the effects of occured events. A case study substantiates the applicability of the approach.

[1]  Katinka Wolter,et al.  Resilience Assessment and Evaluation of Computing Systems , 2012 .

[2]  Boudewijn F. van Dongen,et al.  Cycle Time Prediction: When Will This Case Finally Be Finished? , 2008, OTM Conferences.

[3]  Wil M. P. van der Aalst,et al.  Time prediction based on process mining , 2011, Inf. Syst..

[4]  Günter Müller,et al.  Resilience - A New Research Field in Business Information Systems? , 2013, BIS.

[5]  David Woods,et al.  Resilience Engineering: Concepts and Precepts , 2006 .

[6]  Johann Eder,et al.  Time Management in Workflow Systems , 1999, BIS.

[7]  Stefan Fenz,et al.  FORISK: Formalizing information security risk and compliance management , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).

[8]  Michel Bruneau,et al.  A Framework to Quantitatively Assess and Enhance the Seismic Resilience of Communities , 2003 .

[9]  Johann Eder,et al.  ePERT: Extending PERT for Workflow Management Systems , 1997 .

[10]  Per Runeson,et al.  Guidelines for conducting and reporting case study research in software engineering , 2009, Empirical Software Engineering.

[11]  Jeffrey J. P. Tsai,et al.  Timing Constraint Petri Nets and Their Application to Schedulability Analysis of Real-Time System Specifications , 1995, IEEE Trans. Software Eng..

[12]  Rafael Accorsi,et al.  Security and Trust Management , 2013, Lecture Notes in Computer Science.

[13]  Brian S. Butler,et al.  Reliability, Mindfulness, and Information Systems , 2006, MIS Q..

[14]  Vijayalakshmi Atluri,et al.  Security for Workflow Systems , 2001, Inf. Secur. Tech. Rep..

[15]  Witold Abramowicz Business Information Systems Workshops , 2014, Lecture Notes in Business Information Processing.

[16]  Wil M. P. van der Aalst,et al.  Process Mining - Discovery, Conformance and Enhancement of Business Processes , 2011 .

[17]  C. Ramchandani,et al.  Analysis of asynchronous concurrent systems by timed petri nets , 1974 .

[18]  Christian Zimmermann,et al.  Towards a Detective Approach to Process-Centered Resilience , 2013, STM.

[19]  Moe Thandar Wynn,et al.  Profiling Event Logs to Configure Risk Indicators for Process Delays , 2013, CAiSE.

[20]  Pedro Antunes,et al.  Resilient Business Process Management: Framework and services , 2011, Expert Syst. Appl..

[21]  Günter Müller,et al.  On the exploitation of process mining for security audits: the process discovery case , 2013, SAC '13.