Rules are objects too: A knowledge model for an active, object-oriented databasesystem
Lecture notes in computer science on Advances in object-oriented database systems
Introduction to the theory of programming languages
Introduction to the theory of programming languages
Programming pearls: little languages
Communications of the ACM
Data modeling in UML and ORM: a comparison
Journal of Database Management - Special issue on information modeling methods
A discussion on approaches to handling exceptions in workflows
ACM SIGGROUP Bulletin
Exception Handling for Conflict Resolution in Cross-Organizational Workflows
Distributed and Parallel Databases
Adaptive and Dynamic Service Composition in eFlow
CAiSE '00 Proceedings of the 12th International Conference on Advanced Information Systems Engineering
Process Aware Information Systems: Bridging People and Software Through Process Technology
Process Aware Information Systems: Bridging People and Software Through Process Technology
Integration of risk identification with business process models
Systems Engineering
Security requirement analysis of business processes
Electronic Commerce Research
Data Quality Management using Business Process Modeling
SCC '06 Proceedings of the IEEE International Conference on Services Computing
Operational risk analysis in business processes
BT Technology Journal
Managing Business Process Risk Using Rich Organizational Models
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 02
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Aris Design Platform: Getting Started with Bpm
Aris Design Platform: Getting Started with Bpm
A Risk Reduction Framework for Dynamic Workflows
SCC '08 Proceedings of the 2008 IEEE International Conference on Services Computing - Volume 1
Analyzing Business Continuity through a Multi-layers Model
BPM '08 Proceedings of the 6th International Conference on Business Process Management
Business Process and Risk Models Enrichment: Considerations for Business Intelligence
ICEBE '08 Proceedings of the 2008 IEEE International Conference on e-Business Engineering
How to determine threat probabilities using ontologies and Bayesian networks
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
An Integrated Approach to Managing Business Process Risk Using Rich Organizational Models
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
Aspects of the BPRIM Language for Risk Driven Process Engineering
OTM '09 Proceedings of the Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009
Modern Business Process Automation: YAWL and its Support Environment
Modern Business Process Automation: YAWL and its Support Environment
Dynamic, extensible and context-aware exception handling for workflows
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
Using Complex Event Processing for Dynamic Business Process Adaptation
SCC '10 Proceedings of the 2010 IEEE International Conference on Services Computing
Incorporating risk into business process models
IBM Journal of Research and Development
Time prediction based on process mining
Information Systems
HICSS '11 Proceedings of the 2011 44th Hawaii International Conference on System Sciences
Active Complex Event Processing infrastructure: Monitoring and reacting to event streams
ICDEW '11 Proceedings of the 2011 IEEE 27th International Conference on Data Engineering Workshops
RiskM: A multi-perspective modeling method for IT risk assessment
Information Systems Frontiers
Risk-Aware Business Process Modeling and Simulation Using XML Nets
CEC '11 Proceedings of the 2011 IEEE 13th Conference on Commerce and Enterprise Computing
Formalizing process-based risk with Value-Focused Process Engineering
Information Systems and e-Business Management
A declarative foundation of process models
CAiSE'05 Proceedings of the 17th international conference on Advanced Information Systems Engineering
Business rules segregation for dynamic process management with an aspect-oriented framework
BPM'06 Proceedings of the 2006 international conference on Business Process Management Workshops
Risk management in the BPM lifecycle
BPM'05 Proceedings of the Third international conference on Business Process Management
Factors of process model comprehension-Findings from a series of experiments
Decision Support Systems
Supporting risk-informed decisions during business process execution
CAiSE'13 Proceedings of the 25th international conference on Advanced Information Systems Engineering
Hi-index | 0.00 |
This article proposes an approach for real-time monitoring of risks in executable business process models. The approach considers risks in all phases of the business process management lifecycle, from process design, where risks are defined on top of process models, through to process diagnosis, where risks are detected during process execution. The approach has been realized via a distributed, sensor-based architecture. At design-time, sensors are defined to specify risk conditions which when fulfilled, are a likely indicator of negative process states (faults) to eventuate. Both historical and current process execution data can be used to compose such conditions. At run-time, each sensor independently notifies a sensor manager when a risk is detected. In turn, the sensor manager interacts with the monitoring component of a business process management system to prompt the results to process administrators who may take remedial actions. The proposed architecture has been implemented on top of the YAWL system, and evaluated through performance measurements and usability tests with students. The results show that risk conditions can be computed efficiently and that the approach is perceived as useful by the participants in the tests.