Zusammenfassungen
Existierende Mechanismen zur Prozessauditierung reichen für einen wirksamen Nachweis der Einhaltung verbindlicher Vorgaben und interner Richtlinien nicht aus. Process-Mining-Verfahren können in diesem Zusammenhang dazu beitragen, die Verlässlichkeit und Aussagekräftigkeit von Analyseergebnissen durch Anwendung von Massendatenanalysen erheblich zu steigern. Dieser Beitrag zeigt am Beispiel eines Einkaufsprozesses die Chancen und derzeitigen Grenzen dieser im Prüfungswesen stark an Bedeutung gewinnenden Technologie.
Literatur
Accorsi, R.: Business Process as a Service: Chances for Remote Auditing. IEEE Computer Software and Applications Conference, 2011, pp. 398–403.
Accorsi R.; Stocker T.: On the Exploitation of Process Mining for Security Audits: The Conformance Checking Case. ACM Symposium on Applied Computing, 2012, pp. 1709–1716.
Baumgraß, A.; Baier, T.; Mendling, J.; Strembeck, M.: Conformance Checking of RBAC Policies in Process-Aware Information Systems. Business Process Management Workshops, 2011, pp. 435–446.
Botha, R.; Eloff, J.: Separation of Duties for Access Control Enforcement in Workflow Environments. IBM Systems Journal 40 (2001), 3, pp. 666–682.
Carlin, A.; Gallegos, F.: IT Audit: A Critical Business Process. IEEE Computer 40 (2007), 7, pp. 7–89.
Cook, J.; Wolf, A.: Software Process Validation: Quantitatively Measuring the Correspondence of a Process to a Model. ACM Transactions on Software Engineering Methodology 8 (1999), 2, pp. 147–176.
Dumas, M.; van der Aalst, W.; ter Hofstede, A.: Process Aware Information Systems: Bridging People and Software Through Process Technology. Wiley-Interscience, 2005.
Günther, C.; van der Aalst, W.: Fuzzy Mining: Adaptive Process Simplification Based on Multi-Perspective Metrics. Business Process Management (BPM'07), Springer-Verlag, Berlin, 2007, pp. 328–343.
Lowis, L.; Accorsi, R.: Vulnerability Analysis in SOA-Based Business Processes. IEEE Transactions on Services Computing 4 (2011), 3, pp. 230–242.
van der Aalst, W.: Process Mining — Discovery, Conformance and Enhancement of Business Processes. Springer-Verlag, Heidelberg, 2011.
van der Aalst, W.; de Beer, H.; van Dongen, B.: Process Mining and Verification of Properties: An Approach Based on Temporal Logic. OTM Conferences, 2005, pp. 130–147.
van der Aalst, W.; van Hee, K.; van der Werf, J.; Verdonk, M.: Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor. IEEE Computer 43 (2010), 3, pp. 90–93.
van Dongen, B.; Alves de Medeiros, A.; Wen, L.: Process Mining: Overview and Outlook of Petri Net Discovery Algorithms. Transactions on Petri Nets and Other Models of Concurrency II, 2009, pp. 225–242.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Stocker, T., Accorsi, R. & Rother, T. Computergestützte Prozessauditierung mit Process Mining. HMD 50, 92–103 (2013). https://doi.org/10.1007/BF03340838
Published:
Issue Date:
DOI: https://doi.org/10.1007/BF03340838