Browse > Article

Real-time Risk Measurement of Business Process Using Decision Tree  

Kang, Bok-Young (Department of Industrial Engineering, Seoul National University)
Cho, Nam-Wook (Department of Industrial and Information System Engineering, Seoul National University of Technology)
Kim, Hoon-Tae (Department of Industrial and Systems Engineering, Daejin University)
Kang, Suk-Ho (Department of Industrial Engineering, Seoul National University)
Publication Information
Journal of Korean Society of Industrial and Systems Engineering / v.31, no.4, 2008 , pp. 49-58 More about this Journal
Abstract
This paper proposes a methodology to measure the risk level in real-time for Business Activity Monitoring (BAM). A decision-tree methodology was employed to analyze the effect of process attributes on the result of the process execution. In the course of process execution, the level of risk is monitored in real-time, and an early warning can be issued depending on the change of the risk level. An algorithm for estimating the risk of ongoing processes in real-time was formulated. Comparison experiments were conducted to demonstrate the effectiveness of our method. The proposed method detects the risks of business processes more precisely and even earlier than existing approaches.
Keywords
Business Activity Monitoring; Risk Measurement; Decision Tree; Complex Event Processing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 손성호, 정재윤, 조남욱, 강석호; "프로세스 기반 이 벤트 분석을 이용한 비즈니스 활동 모니터링", 한국전자거래학회지, 12 : 219-231, 2007
2 Abadeh, M. S., Habibi, J., Barzegar, Z., and Sergi, M.; "A parallel genetic local search algorithm for intrusion detection in computer networks," Engineering Applications of Artificial Intelligence, 20(8) : 1058-1069, 2007   DOI   ScienceOn
3 Camci, F. and Chinnam, R. B.; "General support vector representation machine for one-class classification of non-stationary classes," Pattern Recognition, 41(10) : 3021-3034, 2008   DOI   ScienceOn
4 Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., and Shan, M-C.; "Business Process Intelligence," Computers in Industry, 53 : 321-343, 2004   DOI   ScienceOn
5 Lamport, L.; "Time, Clocks, and the Ordering of Events in a Distributed System," Communications of the ACM, 21(7) : 558-565, 1978   DOI   ScienceOn
6 Leymann, F., Roller, D., and Schmidt, M-T.; "Web Services and Business Process Management," IBM Systems Journal, 41(2), 2002
7 Sharma, A., Pujari, A. K., and Paliwal, K. K.; "Intrusion detection using text processing techniques with a kernel based similarity measure," Computers and Security, 26 : 488-495, 2007   DOI   ScienceOn
8 Mendling, J., Verbeek, H. M. W., van Dongen, B. F., van der Aalst, W. M. P., and Neumann, G.; "Detection and prediction of errorsin EPCs of the SAP reference model," Data and Knowledge Engineering, 64(1) : 312-329, 2008   DOI   ScienceOn
9 Duda, R. O., Hart, P. E. and Stork, D. G.; Pattern Classification, Wiley-interscience, 2001
10 Mitchell, T. M.; Machine Learning, McGraw-Hill, Inc., New York, 1997
11 Wang D. and Romagnoli, J. A.; "Robust multi-scale principal components analysis with applications to process monitoring," Journal of Process Control, 15(8) : 869-882, 2005   DOI   ScienceOn
12 Adams, P.; "What's going on? [business activity monitoring]," Manufacturing Engineer, 81(6) : 282-283, 2002   DOI   ScienceOn
13 Albaghdadi, M., Briley, B., and Evens, M.; "Event storm detection and identification in communication systems," Reliability Engineering and System Safety, 91 (5) : 602-613, 2006   DOI   ScienceOn
14 Golfarelli, M., Rizzi, S., and Cella, I.; "Beyond data warehousing : what's next in business intelligence?," Proceedings of the 7th ACM international workshop on Data warehousing and OLAP, : 1-6, 2004
15 Luckham, D. C. and Frasca, B.; "Complex Event Processing in Distributed Systems," Stanford University, 1998
16 Lundberg, A.; "Leverage Complex Event Processing to Improve Operational Performance," Business Intelligence, 11(1) : 55-65, 2006
17 Perrochon, L., Mann, W., Kasriel, S., and Luckham, D. C.; "Event Mining with Event Processing Networks," Proceedings of Methodologies for Knowledge Discovery and Data Mining : Third Pacific-Asia Conference, 1574 : 474-478, 1999
18 Rolland, C.; "Modeling the Requirements Engineering Process," 3rd European-Japanese Seminar on Information Modelling and Knowledge Bases, 1993
19 Adi, A., Botzer, D., and Etzion, O.;"Semantic Event Model and Its Implication on Situation Detection," Proceedings of the 2000 European Conference on Information, 2000
20 Gross, P. N., Gupta, S., Kasier, G. E., Gaurav, S. K., and Parekh, J. J.; "An Active Events Model for Systems Monitoring," Working Conference on Complex and Dynamic Systems, 2001
21 Luckham, D. C.; The Power of Events, Person Education, 2002