Fraud Detection on Event Logs of Goods and Services Procurement Business Process Using Heuristics Miner Algorithm

被引:0
作者
Rahmawati, Dewi [1 ]
Yaqin, Muhammad Ainul [1 ]
Sarno, Riyanarto [1 ]
机构
[1] Inst Teknol Sepuluh Nopember, Dept Informat Engn, Surabaya, Indonesia
来源
PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGY AND SYSTEMS (ICTS) | 2016年
关键词
event logs; heuristic miner; process mining; fraud; procurement;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Event logs are history records that contain sequence data for the activity of a case that has been executed by an information system. Event logs can be valuable information with a technique called mining process. With this technique, cheating on the business processes of an enterprise can be detected early on. Thus, the company can commit further examination of business processes, especially the business process of procurement of goods and services to achieve business process is expected.([8]) In this study, management data of event log obtained from log data at each event transaction procurement and services. The event log data is then analyzed using a heuristic miner algorithm. Heuristics miner algorithm chosen because it has advantages that are not owned by Alpha++ algorithm that this algorithm can calculate the frequency relation between activities in the log to determine the causal dependency. Heuristic Miner can be used to determine the predominant process of thousands of logs and detect behaviors that are not common in a process.([11]) This study aims to detect anomalies on business processes that occur during the process of procurement of goods and services by calculating the fitness value of the event log into the system. Heuristic miner algorithm using the results obtained identification accuracy of 0.88%.
引用
收藏
页码:249 / 254
页数:6
相关论文
共 18 条
  • [1] [Anonymous], 2006, BETA WORKING PAPER S
  • [2] [Anonymous], IDENTIFIKASI PENGEND
  • [3] [Anonymous], INT REV COMPUTERS SO
  • [4] Chary, 2009, PRODUCTION OPERATION
  • [5] Huda S., 2014, P INT C INF COMM TEC
  • [6] Fuzzy MADM Approach for Rating of Process-Based Fraud
    Huda, Solichul
    Sarno, Riyanarto
    Ahmad, Tohari
    [J]. JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2015, 9 (02) : 111 - 128
  • [7] Huda Solichul, 2013, SURABAYA INT J SOFTW
  • [8] Monisola Olowolaju, 2013, EFFECT INTERNAL AUDI
  • [9] Rozinat A., 2007, CONFORMANCE CHECKING
  • [10] Sarno Riyanarto, 2013, Journal of Theoretical and Applied Information Technology, V54, P31