Propagation of Event Content Modification in Business Processes
Business processes are composed mainly of activities and events. The latter has gained much focus recently which has resulted in the drift towards Event-Driven Business Process Management (EDBPM). Events are used in both monitoring and controlling the execution of business processes. They are considered to be instantaneous and their content cannot be modified after they occur. However, this is not always the case in the real world. An event’s content can be modified at runtime under circumstances such as: earlier event information containing errors, or new information being obtained about the event. In such cases, the content modification for that event must be taken into consideration in the execution of the process. Additionally, the modified event’s content may affect other events within the process resulting in altering the content of those events as well. Therefore, it is important to determine the propagation of event content modification in an event network within a business process. In this work, we determine the types of event content modifications that can occur within processes, how content modification of one event affects other events within the process, and how the modification affects the process as a whole.
KeywordsBusiness processes Event content modification (ECM) Modification propagation
This research was partially funded by the Data to Decisions Cooperative Research Centre (D2D CRC).
- 5.Etzion, O., Niblett, P.: Event Processing in Action. Manning Publications Company, London (2010)Google Scholar
- 7.Knuplesch, D., Reichert, M., Kumar, A.: Visually monitoring multiple perspectives of business process compliance. In: Proceedings of BPM, pp. 263–279 (2015)Google Scholar
- 8.Koetter, F., Kochanowski, M., Kintz, M.: Leveraging model-driven monitoring for event-driven business process control. In: Proceedings of EMoV, pp. 21–33 (2014)Google Scholar
- 11.Leitner, P., Michlmayr, A., Rosenberg, F., Dustdar, S.: Monitoring, prediction and prevention of SLA violations in composite services. In: Proceedings of ICWS, pp. 369–376 (2010)Google Scholar
- 12.Montali, M., Maggi, F.M., Chesani, F., Mello, P., van der Aalst, W.M.P.: Monitoring business constraints with the event calculus. ACM TIST 5, 17:1–17:30 (2013)Google Scholar
- 13.Patri, O.P., Sorathia, V.S., Panangadan, A.V., Prasanna, V.K.: The process-oriented event model (poem): a conceptual model for industrial events. In: Proceedings of DEBS, pp. 154–165. ACM (2014)Google Scholar
- 14.Scheer, A.W., Thomas, O., Adam, O.: Process modeling using event-driven process chains. In: Process-Aware Information Systems, pp. 119–146 (2005)Google Scholar
- 16.Sripada, S.M.: A logical framework for temporal deductive databases. In: Proceedings of VLDB, pp. 171–182 (1988)Google Scholar
- 18.Wieringa, R.J.: Design Methods for Reactive Systems: Yourdon, Statemate, and the UML. Elsevier, Amsterdam (2003)Google Scholar
- 19.Wondoh, J., Grossmann, G., Stumptner, M.: Utilising bitemporal information for business process contingency management. In: Proceedings of APCCM, pp. 45:1–45:10. ACM (2016)Google Scholar