Predictive Monitoring of Business Processes

被引:0
作者
Maggi, Fabrizio Maria [1 ]
Di Francescomarino, Chiara [2 ]
Dumas, Marlon [1 ]
Ghidini, Chiara [2 ]
机构
[1] Univ Tartu, EE-50409 Tartu, Estonia
[2] FBK IRST, I-38050 Trento, Italy
来源
ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2014) | 2014年 / 8484卷
关键词
Predictive Process Monitoring; Recommendations; Business Constraints; Linear Temporal Logic; VERIFICATION; SUPPORT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern information systems that support complex business processes generally maintain significant amounts of process execution data, particularly records of events corresponding to the execution of activities (event logs). In this paper, we present an approach to analyze such event logs in order to predictively monitor business constraints during business process execution. At any point during an execution of a process, the user can define business constraints in the form of linear temporal logic rules. When an activity is being executed, the framework identifies input data values that are more (or less) likely to lead to the achievement of each business constraint. Unlike reactive compliance monitoring approaches that detect violations only after they have occurred, our predictive monitoring approach provides early advice so that users can steer ongoing process executions towards the achievement of business constraints. In other words, violations are predicted (and potentially prevented) rather than merely detected. The approach has been implemented in the ProM process mining toolset and validated on a real-life log pertaining to the treatment of cancer patients in a large hospital.
引用
收藏
页码:457 / 472
页数:16
相关论文
共 50 条
[31]   Towards Reliable Predictive Process Monitoring [J].
Klinkmueller, Christopher ;
van Beest, Nick R. T. P. ;
Weber, Ingo .
INFORMATION SYSTEMS IN THE BIG DATA ERA, 2018, 317 :163-181
[32]   Verification of Business Processes Against Business Rules Using Object Life Cycles [J].
Hoch, Ralph ;
Rathmair, Michael ;
Kaindl, Hermann ;
Popp, Roman .
NEW ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2016, 444 :589-598
[33]   On Risk Management with Information Flows in Business Processes [J].
Bai, Xue ;
Krishnan, Ramayya ;
Padman, Rema ;
Wang, Harry Jiannan .
INFORMATION SYSTEMS RESEARCH, 2013, 24 (03) :731-749
[34]   On Compatibility Analysis of Inter Organizational Business Processes [J].
Sbai, Zohra ;
Barkaoui, Kamel .
ENTERPRISE AND ORGANIZATIONAL MODELING AND SIMULATION (EOMAS 2014), 2014, 191 :171-186
[35]   Steering Dynamic Collaborations Between Business Processes [J].
Zhao, Xiaohui ;
Liu, Chengfei .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2010, 40 (04) :743-757
[36]   An approach to capture authorisation requirements in business processes [J].
Wolter, Christian ;
Meinel, Christoph .
REQUIREMENTS ENGINEERING, 2010, 15 (04) :359-373
[37]   A Correctness Enforcement Approach for Collaborative Business Processes [J].
Mo, Qi ;
Bai, Lirui ;
Dai, Fei ;
Qin, Jianglong ;
Xie, Zhongwen ;
Li, Tong .
IEEE ACCESS, 2019, 7 :87069-87084
[38]   Improving Business Processes in HIS by Adding Dynamicity [J].
Kalibatiene, Diana ;
Trinkunas, Justas ;
Rusinaite, Toma ;
Vasilecas, Olegas .
INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2016, 2016, 639 :132-147
[39]   Model checking authorization requirements in business processes [J].
Armando, Alessandro ;
Ponta, Serena Elisa .
COMPUTERS & SECURITY, 2014, 40 :1-22
[40]   Soundness of Decision-Aware Business Processes [J].
Batoulis, Kimon ;
Weske, Mathias .
BUSINESS PROCESS MANAGEMENT FORUM, 2017, 297 :106-124