Value-Driven Risk Analysis of Coordination Models

  • Dan IonitaEmail author
  • Jaap Gordijn
  • Ahmed Seid Yesuf
  • Roel Wieringa
Conference paper
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 267)


Coordination processes are business processes that involve independent profit-and-loss responsible business actors who collectively provide something of value to a customer. Coordination processes are meant to be profitable for the business actors that execute them. However, because business actors are independent, there is also an increased risk of fraud. To compute profitability as well as quantify the risk of fraud, we need to attach value models to coordination process models. In this paper, we propose guidelines for deriving a value model from any coordination process model. Next, we show how our approach can be used to identify possibilities of fraud offered by a coordination process, as well as quantify the financial impact of known fraudulent processes. Finally, we discuss additional applications, such as identifying commercially superfluous tasks, or missing tasks needed to achieve a financially sustainable process.


Risk-aware BPM Cost-aware BPM Process analysis and improvement 



The authors would like to thank Manfred Jeusfeld (University of Skovde) for his valuable input. The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7/2007–2013) under grant agreements SEC-261696 (SESAME) and ICT-318003 (TREsPASS). This publication reflects only the authors views and the Union is not liable for any use that may be made of the information contained herein.


  1. 1.
    Ionita, D., Wieringa, R.J., Wolos, L., Gordijn, J., Pieters, W.: Using value models for business risk analysis in e-service networks. In: Ralyté, J., et al. (eds.) PoEM 2015. LNBIP, vol. 235, pp. 239–253. Springer, Heidelberg (2015). doi: 10.1007/978-3-319-25897-3_16 CrossRefGoogle Scholar
  2. 2.
    Ionita, D., Wieringa, R.J., Gordijn, J.: Automated identification and prioritization of business risks in e-service networks. In: Borangiu, T., Dragoicea, M., Nóvoa, H. (eds.) IESS 2016. LNBIP, vol. 247, pp. 547–560. Springer, Heidelberg (2016). doi: 10.1007/978-3-319-32689-4_42 CrossRefGoogle Scholar
  3. 3.
    Gordijn, J., Akkermans, H.: Designing and evaluating e-business models. IEEE Intell. Syst. 16(4), 11–17 (2001)CrossRefGoogle Scholar
  4. 4.
    vam der Aalst, W.M.P.: Discovering coordination patterns using process mining. In: Bocchi, L., Ciancarini, P. (eds.) Proceedings of the First International Workshop on Petri Nets and Coordination, PNC 2004, CNR PISA, Italy, STAR (Servizio Tipografico Area della Ricerca), pp. 49–64 (2004)Google Scholar
  5. 5.
    Fatemi, H., van Sinderen, M., Wieringa, R.: E\(^\text{3 }\)value to BPMN model transformation. In: Camarinha-Matos, L.M., Pereira-Klen, A., Afsarmanesh, H. (eds.) PRO-VE 2011. IFIP AICT, vol. 362, pp. 333–340. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  6. 6.
    Schuster, R., Motal, T., Huemer, C., Werthner, H.: From economic drivers to B2B process models: a mapping from REA to UMM. In: Abramowicz, W., Tolksdorf, R. (eds.) BIS 2010. LNBIP, vol. 47, pp. 119–131. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  7. 7.
    Schuster, R., Motal, T.: From e3-value to REA: modeling multi-party e-business collaborations. In: Proceedings of the 2009 IEEE Conference on Commerce and Enterprise Computing, CEC 2009, pp. 202–208. IEEE Computer Society, Washington, DC (2009)Google Scholar
  8. 8.
    Kartseva, V., Gordijn, J., Tan, Y.-H.: Designing value-based inter-organizational controls using patterns. In: Lyytinen, K., Loucopoulos, P., Mylopoulos, J., Robinson, B. (eds.) Design Requirements Engineering. LNBIP, vol. 14, pp. 276–301. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  9. 9.
    Weigand, H., Johannesson, P., Andersson, B., Bergholtz, M., Edirisuriya, A., Ilayperuma, T.: Value modeling and the transformation from value model to process mode. In: Doumeingts, G., Mller, J., Morel, G., Vallespir, B. (eds.) Enterprise Interoperability: New Challenges and Approaches, pp. 1–10. Springer, London (2007)Google Scholar
  10. 10.
    Pijpers, V., Gordijn, J.: Bridging business value models and process models in aviation value webs via possession rights. In: 40th Annual Hawaii International Conference on System Sciences, HICSS 2007, p. 175a. IEEE (2007)Google Scholar
  11. 11.
    Weske, M.: Business Process Management: Concepts, Languages, Architectures. Springer Science & Business Media, Berlin (2012)CrossRefGoogle Scholar
  12. 12.
    Juric, M.B.: Business Process Execution Language for Web Services BPEL and BPEL4WS, 2nd edn. Packt Publishing, Birmingham (2006)Google Scholar
  13. 13.
    Ouyang, C., van der Aalst, W.M.P., Dumas, M., Ter Hofstede, A. H.: Translating BPMN to BPEL. Technical report BPM-06-02, BPM Center (2006)Google Scholar
  14. 14.
    White, S.A.: Using BPMN to model a BPEL process (2005)Google Scholar
  15. 15.
    Ouyang, C., Dumas, M., ter Hofstede, A.H., van der Aalst, W.M.: Pattern-based translation of BPMN process models to BPEL web services. Int. J. Web Serv. Res. (JWSR) 5(1), 42–62 (2007)CrossRefGoogle Scholar
  16. 16.
    Weidlich, M., Decker, G., Großkopf, A., Weske, M.: BPEL to BPMN: the myth of a straight-forward mapping. In: Tari, Z., Meersman, R. (eds.) OTM 2008, Part I. LNCS, vol. 5331, pp. 265–282. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  17. 17.
    Recker, J.C., Mendling, J.: On the translation between BPMN and BPEL: conceptual mismatch between process modeling languages. In: Latour, T., Petit, M. (eds) 18th International Conference on Advanced Information Systems Engineering, Proceedings of Workshops and Doctoral Consortiums, pp. 521–532. Namur University Press (2006)Google Scholar
  18. 18.
    Osterwalder, A., Pigneur, Y.: An eBusiness model ontology for modeling eBusiness. In: BLED 2002 Proceedings 2 (2002)Google Scholar
  19. 19.
    McCarthy, W.E.: The REA accounting model: a generalized framework for accounting systems in a shared data environment. Account. Rev. 57(3), 554 (1982)Google Scholar
  20. 20.
    Gordijn, J., Akkermans, H., van Vliet, H.: Business modelling is not process modelling. In: Mayr, H.C., Liddle, S.W., Thalheim, B. (eds.) ER Workshops 2000. LNCS, vol. 1921, p. 40. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  21. 21.
    Indulska, M., Recker, J., Rosemann, M., Green, P.: Business process modeling: current issues and future challenges. In: van Eck, P., Gordijn, J., Wieringa, R. (eds.) CAiSE 2009. LNCS, vol. 5565, pp. 501–514. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  22. 22.
    Object Management Group (OMG): BPMN 2.0 by example. Technical report dtc/2010-06-02, June 2010Google Scholar
  23. 23.
    Gordijn, J.: E-business value modelling using the e3-value ontology, chap. 5, pp. 98–127. Elseviers, Butterworth-Heinemann, Oxford (2004). Preprint availableGoogle Scholar
  24. 24.
    Onoda, S., Ikkai, Y., Kobayashi, T., Komoda, N.: Definition of deadlock patterns for business processes workflow models. In: HICSS 1999: Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciencess, Washington, DC, USA, vol. 5, pp. 55–65, January 1999Google Scholar
  25. 25.
    Awad, A., Puhlmann, F.: Structural detection of deadlocks in business process models. In: Abramowicz, W., Fensel, D. (eds.) BIS 2008. LNBIP, pp. 239–250. Springer, Berlin (2008)CrossRefGoogle Scholar
  26. 26.
    Kartseva, V., Gordijn, J., Tan, Y.-H.: Designing value-based inter-organizational controls using patterns. In: Lyytinen, K., Loucopoulos, P., Mylopoulos, J., Robinson, B. (eds.) Design Requirements Engineering. LNBIP, vol. 14, pp. 276–301. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  27. 27.
    Fu, X., Bultan, T., Su, J.: In: Conversation Protocols: A Formalism for Specification and Verification of Reactive Electronic Services. Springer, Berlin (2003)CrossRefGoogle Scholar
  28. 28.
    Decker, G., Weske, M.: Local enforceability in interaction Petri nets. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 305–319. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  29. 29.
    Decker, G., Barros, A., Kraft, F.M., Lohmann, N.: Non-desynchronizable service choreographies. In: Bouguettaya, A., Krueger, I., Margaria, T. (eds.) ICSOC 2008. LNCS, vol. 5364, pp. 331–346. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  30. 30.
    Scourias, J.: Overview of the global system for mobile communications. Technical report (1995)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2016

Authors and Affiliations

  • Dan Ionita
    • 1
    Email author
  • Jaap Gordijn
    • 2
  • Ahmed Seid Yesuf
    • 3
  • Roel Wieringa
    • 1
  1. 1.Cybersecurity and Safety GroupUniversity of Twente ServicesEnschedeThe Netherlands
  2. 2.Vrije Universiteit AmsterdamAmsterdamNetherlands
  3. 3.D-Telekom Chair of Mobile Business & Multilateral SecurityGoethe UniversityFrankfurt am MainGermany

Personalised recommendations