Skip to main content

Predicting Deadline Transgressions Using Event Logs

  • Conference paper

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 132))

Abstract

Effective risk management is crucial for any organisation. One of its key steps is risk identification, but few tools exist to support this process. Here we present a method for the automatic discovery of a particular type of process-related risk, the danger of deadline transgressions or overruns, based on the analysis of event logs. We define a set of time-related process risk indicators, i.e., patterns observable in event logs that highlight the likelihood of an overrun, and then show how instances of these patterns can be identified automatically using statistical principles. To demonstrate its feasibility, the approach has been implemented as a plug-in module to the process mining framework ProM and tested using an event log from a Dutch financial institution.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adriansyah, A., van Dongen, B.F., van der Aalst, W.M.P.: Conformance checking using cost-based fitness analysis. In: 2011 15th IEEE International Enterprise Distributed Object Computing Conference (EDOC), pp. 55–64. IEEE (2011)

    Google Scholar 

  2. Bose, R., van der Aalst, W.M.P.: Context aware trace clustering: Towards improving process mining results. In: Proceedings of the SIAM International Conference on Data Mining, SDM, pp. 401–412 (2009)

    Google Scholar 

  3. International Organization for Standardization. Risk management: vocabulary = Management du risque: vocabulaire (ISO guide 73), Geneva (2009)

    Google Scholar 

  4. Jallow, A.K., Majeed, B., Vergidis, K., Tiwari, A., Roy, R.: Operational risk analysis in business processes. BT Technology Journal 25(1), 168–177 (2007)

    Article  Google Scholar 

  5. Jans, M., Lybaert, N., Vanhoof, K., van der Werf, J.M.: A business process mining application for internal transaction fraud mitigation. Expert Systems with Applications 38(10), 13351–13359 (2011)

    Article  Google Scholar 

  6. Rousseeuw, P.J.: Robust estimation and identifying outliers. In: Handbook of Statistical Methods for Engineers and Scientists, ch. 16. McGraw-Hill, New York (1990)

    Google Scholar 

  7. Standards Australia and Standards New Zealand. Risk management: principles and guidelines (AS/NZS ISO 31000:2009), 3rd edn., Sydney, NSW, Wellington, NZ (2009)

    Google Scholar 

  8. van der Aalst, W.M.P., Schonenberg, M.H., Song, M.: Time prediction based on process mining. Information Systems 36(2), 450–475 (2011)

    Article  Google Scholar 

  9. van Dongen, B., Crooy, R., van der Aalst, W.M.P.: Cycle time prediction: When will this case finally be finished? In: On the Move to Meaningful Internet Systems: OTM 2008, pp. 319–336 (2008)

    Google Scholar 

  10. Wickboldt, J.A., Bianchin, L.A., Lunardi, R.C., Granville, L.Z., Gaspary, L.P., Bartolini, C.: A framework for risk assessment based on analysis of historical information of workflow execution in it systems. Computer Networks 55(13), 2954–2975 (2011)

    Article  Google Scholar 

  11. Zhang, P., Serban, N.: Discovery, visualization and performance analysis of enterprise workflow. Computational Statistics & Data Analysis 51(5), 2670–2687 (2007)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pika, A., van der Aalst, W.M.P., Fidge, C.J., ter Hofstede, A.H.M., Wynn, M.T. (2013). Predicting Deadline Transgressions Using Event Logs. In: La Rosa, M., Soffer, P. (eds) Business Process Management Workshops. BPM 2012. Lecture Notes in Business Information Processing, vol 132. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36285-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36285-9_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36284-2

  • Online ISBN: 978-3-642-36285-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics