SlideShare a Scribd company logo
1 of 25
Download to read offline
PROFILING EVENT LOGS TO CONFIGURE
RISK INDICATORS FOR PROCESS DELAYS
25th International Conference on Advanced Information Systems Engineering,
Valencia, Spain
21 June 2013
Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge,
Arthur H. M. ter Hofstede, and Moe T. Wynn
Queensland University of Technology & Eindhoven University of Technology
Presenter: Moe T. Wynn
Risk-aware Business Process Management
2
“It will investigate, evaluate and enhance current approaches for the
identification, analysis, evaluation, treatment, and overall management of
risk as it relates to business processes”
BPM lifecycle
ARC Discovery Grant Project 2011-2013. Risk-aware business process management
ISO 31000:9000
Risk Management Process
3
Process-related risk is one that threatens the achievement of one or
more process goals
 A negative effect in terms of timeliness, cost, or quality of the
outcome.
 Is caused by any combination of process design, resource
behaviour, or case-data.
 E.g., Breaching SLA agreements in terms of completion times,
over-running agreed budgets, producing low-quality outputs
.
International Organization for Standardization. Risk management: vocabulary = Management
du risque: vocabulaire (ISO guide 73). Geneva, 2009.
Process-related risk
Risk - “effect of uncertainty on objectives” where “an effect is a
deviation from the expected - positive and/or negative.”
Research Scope
4
 Objective: Develop techniques for identification of process-
related risks
 Time-based process related risk: Case Delays
Question: Can we identify the risk of case delays by
analyzing the behaviour of a process?
<a, b, c, d, e>
<a, b, c, d, e>
<a, b, c, c, c, c, d, e>
<a, b, c, d, e>
<a, b, c, d, e>
When an activity is repeated multiple
times, the likelihood of a case delay is high.
Starting point: exploiting event log data
5
 Modern organisations automate their business processes and processes’
execution data is usually recorded in event logs.
 Process mining provides techniques and tools that help to extract
knowledge about processes from event logs.
Research Approach
6
Goal: develop a method that can identify the risk of
delay for cases with a high degree of precision
 This idea was presented at BPI 2012 workshop [14]
Define Process
Risk Indicators
(PRIs)
Configure PRIs
Identify the
presence of PRI
instances in a
current case
Step 1: Define Process Risk Indicators
7
 Process Risk Indicator (PRI) - a pattern observable in an event log whose presence
indicates a higher likelihood of some process-related risk.
Activity-based PRIs
PRI3: Multiple activity repetitions PRI4: Presence of a “risky” activity
PRI1: Atypical activity execution time PRI2: Atypical waiting time
PRI 6: Atypical sub-process duration
Activity Resource
A R1
B R23
C R12
D R11
E R5
F R4
- -
Process Risk Indicators (Resource-based)
8
Resource-based PRIs
PRI5: Multiple resource involvement PRI7: High resource workload
PRI8: Use of a “risky” resource
Activity Resource
A R1
B R1
C R1
D R1
E R5
F R4
- -
Activity Resource
A R1
B R1
C R111
D R1
E R5
F R4
- -
PRI instantiation from logs: approach in [14]
9
 “Sample standard deviations” approach for outlier detection:
 Cut-off thresholds for a PRI:
 Limitations:
 Assumption of a normal distribution
 Assumption that any atypical behavior is “risky”
 E.g., a large variation in execution time of a short activity has the same impact
on case delay predictions as those of a long activity
 Results:
 Indicators can predict case delays but obtained a high level of false
positive predictions
 cases that are predicted to be late but in the end are not
Step 2: Configure Process Risk Indicators
10
 Motivation: calibrate PRIs so that process semantics are considered
 How: using information about the known outcomes from cases in the
past (whether they are delayed or completed on time)
 Learn the threshold values for PRIs for a desired precision level
 Input parameter: precision level – 80%, 85%, 90%
 Input parameter: a log (training set)
Example of configuring PRI 1:
“Atypical activity duration”
11
 If the duration of activity A is more than t days there is a high risk of the
case delay.
10?
20?
??
To define t:
2. Calculate for each value in C precision of delay predictions in the training set:
• If activity A was executed for more than 12 days 60% of cases were delayed
• If activity A was executed for more than 16 days 90% of cases were delayed …
3. Assign t the smallest value from C that allows predicting delays with a
desired degree of precision.
• t = 16 if we would like 90% precision level
10
12 14
18
16
20
…
C
1. Define a pool of candidates C
including values:
Example of configuring PRI 5:
“Multiple resource involvement”
12
 If more than t resources are involved in a case there is a high risk of the
case delay.
5?
8?
??
To define t:
2. Calculate for each value in C precision of delay predictions in the training
set:
• If more than 7 resources were involved 80% of cases were delayed
• If more than 8 resources were involved 95% of cases were delayed …
3. Assign t the smallest value from C that allows predicting delays with a
desired degree of precision.
• t = 8
3
4 7
8
5
9
…
C
1. Define a pool of candidates C
including values:
Configuring other PRIs
13
 Activity-based PRIs: PRI 1, 2, 3, 6
 Resource-based PRIs: PRI 5, 7
 PRI 4: Presence of a risky activity
 we check if there exists an activity that is executed mainly in
delayed cases
 PRI 8: Use of a risky resource
 we check for each pair “activity-resource" if some resource's
involvement in the execution of an activity mainly occurs in
delayed cases
Step 3: Identify the presence of PRI
instances in a current case14
 Input parameter: log (test set)
 Compare the values for a current case against the thresholds
of PRIs
 Record a likelihood of a case delay (0 or 1)
 if the number is higher than the value of the learned threshold t
 if a ‘risky’ activity is present in the current case
 If an activity is assigned to a ‘risky’ resource
Implementation within the ProM framework
15
Event log
ProM plug-in
1. Inputs: expected case duration
2. Learn cut-off thresholds for PRIs and Identify the presence of PRIs in cases
3. If any of the PRIs is identified in a case, we consider that there is a risk of delay
4. Compare predicted values with the real case durations
Case ID PRI 1 PRI 2 PRI 3 PRI 4 PRI 5 PRI 6 PRI 7 PRI 8 Risk
1000 1 0 1 0 1 1 1 1 1
102 0 0 0 0 0 0 0 0 0
103 0 0 1 0 0 0 0 0 1
106 0 0 0 0 0 0 0 0 0
305 0 0 0 0 0 0 0 0 0
554 0 0 0 0 0 0 0 0 0
Delayed
activity
Multiple
resources
Activity
repetitions
Validation with real event logs
Experimental setup
16
 Hold-out cross-validation training and test sets (75:25)
 “Random” split and “Time” split (4:2 months)
 Evaluation of precision and recall
 Precision: the fraction of cases predicted to be delayed that are actually
delayed
 Recall: the fraction of delayed cases that can be successfully predicted
against the actually delayed cases
 Data pre-processing:
 Completed cases
 Recent data
 Separating cases that are executed in different contexts (e.g., different
departments)
Validation with real event logs
Data sets
17
 Six Data sets from Suncorp, a large Australian insurance company
 Represent insurance claim processes from different organisational units
Properties of data set A
Properties of data sets B1-B5
Validation with real event logs
Results. Data set A. “Random” split experiment.
19
Legend:
• 95%, 90%, 80% - desired precision levels
• TP – True Positives (cases predicted
correctly as delayed)
• FP – False Positives (cases predicted to be
delayed but are not delayed)
• FN – False Negatives (delayed cases that
are not predicted to be delayed)
• TN – True Negatives (in time cases that
are also not predicted to be delayed)
• PRI 1: Atypical activity execution time
• PRI 2: Atypical waiting time
• PRI 3: Multiple activity repetitions
• PRI 4: Presence of a “risky” activity
• PRI 5: Multiple resource involvement
• PRI 6: Atypical sub-process duration
• PRI 7: High resource workload
• PRI 8: Use of a “risky” resource
Validation with real event logs
Results. Data set A, “Time” split experiment.
20
Legend:
• 95%, 90%, 80% - desired precision levels
• TP – True Positives (cases predicted correctly as
delayed)
• FP – False Positives (cases predicted to be
delayed but are not delayed)
• FN – False Negatives (delayed cases that are not
predicted to be delayed)
• TN – True Negatives (in time cases that are also
not predicted to be delayed)
• PRI 1: Atypical activity execution time
• PRI 2: Atypical waiting time
• PRI 3: Multiple activity repetitions
• PRI 4: Presence of a “risky” activity
• PRI 5: Multiple resource involvement
• PRI 6: Atypical sub-process duration
• PRI 7: High resource workload
• PRI 8: Use of a “risky” resource
Data set A. “Random” split experiment (without
configuration)
22
Moment of delay prediction: motivation
23
 Predicting delays early during a case’s execution is a
highly desirable capability
 Early risk detection enables risk mitigation:
 Risk elimination (e.g. reallocation of an activity to other
resource)
 Reduction of impact (e.g. adding additional resources in a
case to decrease extent of delay)
Moment of delay prediction
Data set A, Random split, 90% precision level
24
x: The number of days since the beginning of a case when the risk of the case delay
was discovered.
y: The cumulative number of delay predictions at a certain point in time
Observations from the experiments
25
• Good predictors in all data sets:
• PRI 1: Atypical activity execution time
• PRI 2: Atypical waiting time
• PRI 6: Atypical sub-process duration
• Good predictors in some data sets:
• PRI 3: Multiple activity repetitions
• PRI 4: Presence of a ‘risky’ activity
• PRI 7: High resource workload
• PRI 8: Use of a ‘risky’ resource
• Early predictions:
• PRI 4: Presence of a ‘risky’ activity
• PRI 7: High resource workload
• PRI 8: Use of a ‘risky’ resource
• Limitations of the data:
• High process variability in data
sets B1-B5
• No complete information about
resource workload
• Limitations of the approach:
• Assumption that a process is in a
steady state
• External context is not
considered
Conclusions and Future work
26
 A method for predicting case delays with a high degree of precision
 Utilise eight process risk indicators
 Calibrate the threshold values for risk indicators using log data
 Predict the likelihood of case delays using current case and log data
 Experiments showed that this approach
 decreases the level of false positive alerts,
 significantly improves the precision of case delay predictions,
 can predict case delays before a certain deadline
 Future work:
 Investigating the relation between PRIs and the extent of the expected
delay
 Alternative approaches: neural networks, decision trees
 Applying the technique to other types of risks (e.g., budget overrun or
low-quality output)
PROFILING EVENT LOGS TO CONFIGURE
RISK INDICATORS FOR PROCESS DELAYS
Thank You! Questions?
Email: m.wynn@qut.edu.au
Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge,
Arthur H. M. ter Hofstede, and Moe T. Wynn

More Related Content

Viewers also liked

From Low-Level Events to Activities - A Pattern based Approach
From Low-Level Events to Activities - A Pattern based ApproachFrom Low-Level Events to Activities - A Pattern based Approach
From Low-Level Events to Activities - A Pattern based ApproachFelix Mannhardt
 
Ariu - Ph.D. Defense Slides
Ariu - Ph.D. Defense SlidesAriu - Ph.D. Defense Slides
Ariu - Ph.D. Defense SlidesPluribus One
 
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisation
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisationLearning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisation
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisationTore Hoel
 
Investigation of Geometric Process Control
Investigation of Geometric Process ControlInvestigation of Geometric Process Control
Investigation of Geometric Process ControlTian Lin
 
Privacy in Learning Analytics – Implications for System Architecture
Privacy in Learning Analytics – Implications for System ArchitecturePrivacy in Learning Analytics – Implications for System Architecture
Privacy in Learning Analytics – Implications for System ArchitectureTore Hoel
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIDES Editor
 
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...yousef emami
 
Analytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène LyonAnalytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène LyonNRB
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data miningbalbeerrawat
 
Using Alarm Clustering to Minimise Intensive Care Unit False Alarms
Using Alarm Clustering to Minimise Intensive Care Unit False AlarmsUsing Alarm Clustering to Minimise Intensive Care Unit False Alarms
Using Alarm Clustering to Minimise Intensive Care Unit False AlarmsGearoid Lennon
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
IMS Health Workshop World Orphan Drug Congress
IMS Health Workshop World Orphan Drug CongressIMS Health Workshop World Orphan Drug Congress
IMS Health Workshop World Orphan Drug CongressIMSHealthRWES
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachSoftServe
 
IMS Health Clinical Trial Optimization Solutions
IMS Health Clinical Trial Optimization SolutionsIMS Health Clinical Trial Optimization Solutions
IMS Health Clinical Trial Optimization SolutionsQuintilesIMS
 
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...Thoughtworks
 
Big Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businessesBig Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businessesGopalakrishna Palem
 
CBGTBT - Part 4 - Mining
CBGTBT - Part 4 - MiningCBGTBT - Part 4 - Mining
CBGTBT - Part 4 - MiningBlockstrap.com
 

Viewers also liked (19)

From Low-Level Events to Activities - A Pattern based Approach
From Low-Level Events to Activities - A Pattern based ApproachFrom Low-Level Events to Activities - A Pattern based Approach
From Low-Level Events to Activities - A Pattern based Approach
 
Ariu - Ph.D. Defense Slides
Ariu - Ph.D. Defense SlidesAriu - Ph.D. Defense Slides
Ariu - Ph.D. Defense Slides
 
Project
ProjectProject
Project
 
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisation
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisationLearning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisation
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisation
 
Investigation of Geometric Process Control
Investigation of Geometric Process ControlInvestigation of Geometric Process Control
Investigation of Geometric Process Control
 
Privacy in Learning Analytics – Implications for System Architecture
Privacy in Learning Analytics – Implications for System ArchitecturePrivacy in Learning Analytics – Implications for System Architecture
Privacy in Learning Analytics – Implications for System Architecture
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction Technique
 
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
 
Analytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène LyonAnalytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène Lyon
 
Agile data visualisation
Agile data visualisationAgile data visualisation
Agile data visualisation
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data mining
 
Using Alarm Clustering to Minimise Intensive Care Unit False Alarms
Using Alarm Clustering to Minimise Intensive Care Unit False AlarmsUsing Alarm Clustering to Minimise Intensive Care Unit False Alarms
Using Alarm Clustering to Minimise Intensive Care Unit False Alarms
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
IMS Health Workshop World Orphan Drug Congress
IMS Health Workshop World Orphan Drug CongressIMS Health Workshop World Orphan Drug Congress
IMS Health Workshop World Orphan Drug Congress
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric Approach
 
IMS Health Clinical Trial Optimization Solutions
IMS Health Clinical Trial Optimization SolutionsIMS Health Clinical Trial Optimization Solutions
IMS Health Clinical Trial Optimization Solutions
 
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...
 
Big Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businessesBig Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businesses
 
CBGTBT - Part 4 - Mining
CBGTBT - Part 4 - MiningCBGTBT - Part 4 - Mining
CBGTBT - Part 4 - Mining
 

Similar to Moe wynn caise13 presentation

Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09Júlio Venâncio
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006Tim Bass
 
Procedural Risk Management
Procedural Risk ManagementProcedural Risk Management
Procedural Risk ManagementLouis A. Poulin
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.pptabhichowdary16
 
Examples of working with streaming data
Examples of working with streaming dataExamples of working with streaming data
Examples of working with streaming dataYi-Shin Chen
 
Fluency Introduction Deck - October, 23, 2017
Fluency Introduction Deck - October, 23, 2017Fluency Introduction Deck - October, 23, 2017
Fluency Introduction Deck - October, 23, 2017Collin Miles
 
Methods for handling deadlock
Methods for handling deadlockMethods for handling deadlock
Methods for handling deadlocksangrampatil81
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Interset
 
Big data and Process Safety
Big data and Process Safety Big data and Process Safety
Big data and Process Safety cvandr4
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessTim Bass
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...Splunk
 
Crime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCCrime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCAzavea
 
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...Interset
 
Risk Based Approach To Recovery And Continuity Management John P Morency
Risk Based Approach To Recovery And Continuity Management   John P  MorencyRisk Based Approach To Recovery And Continuity Management   John P  Morency
Risk Based Approach To Recovery And Continuity Management John P Morencyjmorency1952
 
Data Provenance for Data Science
Data Provenance for Data ScienceData Provenance for Data Science
Data Provenance for Data SciencePaolo Missier
 
The Event Crowd: A Novel Approach for Crowd-Enabled Event Processing
The Event Crowd: A Novel Approach for Crowd-Enabled Event ProcessingThe Event Crowd: A Novel Approach for Crowd-Enabled Event Processing
The Event Crowd: A Novel Approach for Crowd-Enabled Event ProcessingPiyush Yadav
 
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber SecurityAFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber SecurityDjindo Lee
 
D1 design and analysis approaches to evaluate cardiovascular risk - 2012 eugm
D1   design and analysis approaches to evaluate cardiovascular risk - 2012 eugmD1   design and analysis approaches to evaluate cardiovascular risk - 2012 eugm
D1 design and analysis approaches to evaluate cardiovascular risk - 2012 eugmtherealreverendbayes
 
Eugm 2012 gaydos - design and analysis approaches to evaluate cardiovascula...
Eugm 2012   gaydos - design and analysis approaches to evaluate cardiovascula...Eugm 2012   gaydos - design and analysis approaches to evaluate cardiovascula...
Eugm 2012 gaydos - design and analysis approaches to evaluate cardiovascula...Cytel USA
 

Similar to Moe wynn caise13 presentation (20)

Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
 
Procedural Risk Management
Procedural Risk ManagementProcedural Risk Management
Procedural Risk Management
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
 
Examples of working with streaming data
Examples of working with streaming dataExamples of working with streaming data
Examples of working with streaming data
 
Fluency Introduction Deck - October, 23, 2017
Fluency Introduction Deck - October, 23, 2017Fluency Introduction Deck - October, 23, 2017
Fluency Introduction Deck - October, 23, 2017
 
Methods for handling deadlock
Methods for handling deadlockMethods for handling deadlock
Methods for handling deadlock
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
 
Big data and Process Safety
Big data and Process Safety Big data and Process Safety
Big data and Process Safety
 
Data farmers
Data farmersData farmers
Data farmers
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusiness
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
 
Crime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCCrime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UC
 
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
 
Risk Based Approach To Recovery And Continuity Management John P Morency
Risk Based Approach To Recovery And Continuity Management   John P  MorencyRisk Based Approach To Recovery And Continuity Management   John P  Morency
Risk Based Approach To Recovery And Continuity Management John P Morency
 
Data Provenance for Data Science
Data Provenance for Data ScienceData Provenance for Data Science
Data Provenance for Data Science
 
The Event Crowd: A Novel Approach for Crowd-Enabled Event Processing
The Event Crowd: A Novel Approach for Crowd-Enabled Event ProcessingThe Event Crowd: A Novel Approach for Crowd-Enabled Event Processing
The Event Crowd: A Novel Approach for Crowd-Enabled Event Processing
 
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber SecurityAFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
 
D1 design and analysis approaches to evaluate cardiovascular risk - 2012 eugm
D1   design and analysis approaches to evaluate cardiovascular risk - 2012 eugmD1   design and analysis approaches to evaluate cardiovascular risk - 2012 eugm
D1 design and analysis approaches to evaluate cardiovascular risk - 2012 eugm
 
Eugm 2012 gaydos - design and analysis approaches to evaluate cardiovascula...
Eugm 2012   gaydos - design and analysis approaches to evaluate cardiovascula...Eugm 2012   gaydos - design and analysis approaches to evaluate cardiovascula...
Eugm 2012 gaydos - design and analysis approaches to evaluate cardiovascula...
 

More from caise2013vlc

Markus keuneke partial data-models
Markus keuneke   partial data-modelsMarkus keuneke   partial data-models
Markus keuneke partial data-modelscaise2013vlc
 
Jelena zdravkovic c ai-se 2013 capability caas
Jelena zdravkovic  c ai-se 2013 capability caasJelena zdravkovic  c ai-se 2013 capability caas
Jelena zdravkovic c ai-se 2013 capability caascaise2013vlc
 
Sagar sen caise2013final
Sagar sen caise2013finalSagar sen caise2013final
Sagar sen caise2013finalcaise2013vlc
 
David aguilera presentation
David aguilera   presentationDavid aguilera   presentation
David aguilera presentationcaise2013vlc
 
Sonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalSonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalcaise2013vlc
 
Suriadi caise2013 slides
Suriadi caise2013 slidesSuriadi caise2013 slides
Suriadi caise2013 slidescaise2013vlc
 
Fadila caise2013 vf
Fadila caise2013 vfFadila caise2013 vf
Fadila caise2013 vfcaise2013vlc
 
Henning agt talk-caise-semnet
Henning agt   talk-caise-semnetHenning agt   talk-caise-semnet
Henning agt talk-caise-semnetcaise2013vlc
 
Michael mrissa c aise
Michael mrissa c aiseMichael mrissa c aise
Michael mrissa c aisecaise2013vlc
 
Razvan petrusel presentation caise 2013
Razvan petrusel   presentation caise 2013Razvan petrusel   presentation caise 2013
Razvan petrusel presentation caise 2013caise2013vlc
 
Ramezani taghiabadi temporal compliance checking 2
Ramezani taghiabadi   temporal compliance checking 2Ramezani taghiabadi   temporal compliance checking 2
Ramezani taghiabadi temporal compliance checking 2caise2013vlc
 
Ferreira c ai-se2013-final-handouts
Ferreira   c ai-se2013-final-handoutsFerreira   c ai-se2013-final-handouts
Ferreira c ai-se2013-final-handoutscaise2013vlc
 
Sonja meyer caise 2013
Sonja meyer caise 2013Sonja meyer caise 2013
Sonja meyer caise 2013caise2013vlc
 
Tony clark caise 13-presentation
Tony clark  caise 13-presentationTony clark  caise 13-presentation
Tony clark caise 13-presentationcaise2013vlc
 
Miguel goulao 2013 c-aise
Miguel goulao 2013 c-aiseMiguel goulao 2013 c-aise
Miguel goulao 2013 c-aisecaise2013vlc
 
Jorge cardoso caise-usdl-tosca-2013-06-18c
Jorge cardoso   caise-usdl-tosca-2013-06-18cJorge cardoso   caise-usdl-tosca-2013-06-18c
Jorge cardoso caise-usdl-tosca-2013-06-18ccaise2013vlc
 
Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_caise2013vlc
 
Ignacio panach ormeño et-al_caise2013
Ignacio panach   ormeño et-al_caise2013Ignacio panach   ormeño et-al_caise2013
Ignacio panach ormeño et-al_caise2013caise2013vlc
 
Peter sawyer caise
Peter sawyer  caisePeter sawyer  caise
Peter sawyer caisecaise2013vlc
 

More from caise2013vlc (20)

Caise panel
Caise panelCaise panel
Caise panel
 
Markus keuneke partial data-models
Markus keuneke   partial data-modelsMarkus keuneke   partial data-models
Markus keuneke partial data-models
 
Jelena zdravkovic c ai-se 2013 capability caas
Jelena zdravkovic  c ai-se 2013 capability caasJelena zdravkovic  c ai-se 2013 capability caas
Jelena zdravkovic c ai-se 2013 capability caas
 
Sagar sen caise2013final
Sagar sen caise2013finalSagar sen caise2013final
Sagar sen caise2013final
 
David aguilera presentation
David aguilera   presentationDavid aguilera   presentation
David aguilera presentation
 
Sonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalSonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_final
 
Suriadi caise2013 slides
Suriadi caise2013 slidesSuriadi caise2013 slides
Suriadi caise2013 slides
 
Fadila caise2013 vf
Fadila caise2013 vfFadila caise2013 vf
Fadila caise2013 vf
 
Henning agt talk-caise-semnet
Henning agt   talk-caise-semnetHenning agt   talk-caise-semnet
Henning agt talk-caise-semnet
 
Michael mrissa c aise
Michael mrissa c aiseMichael mrissa c aise
Michael mrissa c aise
 
Razvan petrusel presentation caise 2013
Razvan petrusel   presentation caise 2013Razvan petrusel   presentation caise 2013
Razvan petrusel presentation caise 2013
 
Ramezani taghiabadi temporal compliance checking 2
Ramezani taghiabadi   temporal compliance checking 2Ramezani taghiabadi   temporal compliance checking 2
Ramezani taghiabadi temporal compliance checking 2
 
Ferreira c ai-se2013-final-handouts
Ferreira   c ai-se2013-final-handoutsFerreira   c ai-se2013-final-handouts
Ferreira c ai-se2013-final-handouts
 
Sonja meyer caise 2013
Sonja meyer caise 2013Sonja meyer caise 2013
Sonja meyer caise 2013
 
Tony clark caise 13-presentation
Tony clark  caise 13-presentationTony clark  caise 13-presentation
Tony clark caise 13-presentation
 
Miguel goulao 2013 c-aise
Miguel goulao 2013 c-aiseMiguel goulao 2013 c-aise
Miguel goulao 2013 c-aise
 
Jorge cardoso caise-usdl-tosca-2013-06-18c
Jorge cardoso   caise-usdl-tosca-2013-06-18cJorge cardoso   caise-usdl-tosca-2013-06-18c
Jorge cardoso caise-usdl-tosca-2013-06-18c
 
Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_
 
Ignacio panach ormeño et-al_caise2013
Ignacio panach   ormeño et-al_caise2013Ignacio panach   ormeño et-al_caise2013
Ignacio panach ormeño et-al_caise2013
 
Peter sawyer caise
Peter sawyer  caisePeter sawyer  caise
Peter sawyer caise
 

Recently uploaded

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 

Recently uploaded (20)

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 

Moe wynn caise13 presentation

  • 1. PROFILING EVENT LOGS TO CONFIGURE RISK INDICATORS FOR PROCESS DELAYS 25th International Conference on Advanced Information Systems Engineering, Valencia, Spain 21 June 2013 Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge, Arthur H. M. ter Hofstede, and Moe T. Wynn Queensland University of Technology & Eindhoven University of Technology Presenter: Moe T. Wynn
  • 2. Risk-aware Business Process Management 2 “It will investigate, evaluate and enhance current approaches for the identification, analysis, evaluation, treatment, and overall management of risk as it relates to business processes” BPM lifecycle ARC Discovery Grant Project 2011-2013. Risk-aware business process management ISO 31000:9000 Risk Management Process
  • 3. 3 Process-related risk is one that threatens the achievement of one or more process goals  A negative effect in terms of timeliness, cost, or quality of the outcome.  Is caused by any combination of process design, resource behaviour, or case-data.  E.g., Breaching SLA agreements in terms of completion times, over-running agreed budgets, producing low-quality outputs . International Organization for Standardization. Risk management: vocabulary = Management du risque: vocabulaire (ISO guide 73). Geneva, 2009. Process-related risk Risk - “effect of uncertainty on objectives” where “an effect is a deviation from the expected - positive and/or negative.”
  • 4. Research Scope 4  Objective: Develop techniques for identification of process- related risks  Time-based process related risk: Case Delays Question: Can we identify the risk of case delays by analyzing the behaviour of a process? <a, b, c, d, e> <a, b, c, d, e> <a, b, c, c, c, c, d, e> <a, b, c, d, e> <a, b, c, d, e> When an activity is repeated multiple times, the likelihood of a case delay is high.
  • 5. Starting point: exploiting event log data 5  Modern organisations automate their business processes and processes’ execution data is usually recorded in event logs.  Process mining provides techniques and tools that help to extract knowledge about processes from event logs.
  • 6. Research Approach 6 Goal: develop a method that can identify the risk of delay for cases with a high degree of precision  This idea was presented at BPI 2012 workshop [14] Define Process Risk Indicators (PRIs) Configure PRIs Identify the presence of PRI instances in a current case
  • 7. Step 1: Define Process Risk Indicators 7  Process Risk Indicator (PRI) - a pattern observable in an event log whose presence indicates a higher likelihood of some process-related risk. Activity-based PRIs PRI3: Multiple activity repetitions PRI4: Presence of a “risky” activity PRI1: Atypical activity execution time PRI2: Atypical waiting time PRI 6: Atypical sub-process duration
  • 8. Activity Resource A R1 B R23 C R12 D R11 E R5 F R4 - - Process Risk Indicators (Resource-based) 8 Resource-based PRIs PRI5: Multiple resource involvement PRI7: High resource workload PRI8: Use of a “risky” resource Activity Resource A R1 B R1 C R1 D R1 E R5 F R4 - - Activity Resource A R1 B R1 C R111 D R1 E R5 F R4 - -
  • 9. PRI instantiation from logs: approach in [14] 9  “Sample standard deviations” approach for outlier detection:  Cut-off thresholds for a PRI:  Limitations:  Assumption of a normal distribution  Assumption that any atypical behavior is “risky”  E.g., a large variation in execution time of a short activity has the same impact on case delay predictions as those of a long activity  Results:  Indicators can predict case delays but obtained a high level of false positive predictions  cases that are predicted to be late but in the end are not
  • 10. Step 2: Configure Process Risk Indicators 10  Motivation: calibrate PRIs so that process semantics are considered  How: using information about the known outcomes from cases in the past (whether they are delayed or completed on time)  Learn the threshold values for PRIs for a desired precision level  Input parameter: precision level – 80%, 85%, 90%  Input parameter: a log (training set)
  • 11. Example of configuring PRI 1: “Atypical activity duration” 11  If the duration of activity A is more than t days there is a high risk of the case delay. 10? 20? ?? To define t: 2. Calculate for each value in C precision of delay predictions in the training set: • If activity A was executed for more than 12 days 60% of cases were delayed • If activity A was executed for more than 16 days 90% of cases were delayed … 3. Assign t the smallest value from C that allows predicting delays with a desired degree of precision. • t = 16 if we would like 90% precision level 10 12 14 18 16 20 … C 1. Define a pool of candidates C including values:
  • 12. Example of configuring PRI 5: “Multiple resource involvement” 12  If more than t resources are involved in a case there is a high risk of the case delay. 5? 8? ?? To define t: 2. Calculate for each value in C precision of delay predictions in the training set: • If more than 7 resources were involved 80% of cases were delayed • If more than 8 resources were involved 95% of cases were delayed … 3. Assign t the smallest value from C that allows predicting delays with a desired degree of precision. • t = 8 3 4 7 8 5 9 … C 1. Define a pool of candidates C including values:
  • 13. Configuring other PRIs 13  Activity-based PRIs: PRI 1, 2, 3, 6  Resource-based PRIs: PRI 5, 7  PRI 4: Presence of a risky activity  we check if there exists an activity that is executed mainly in delayed cases  PRI 8: Use of a risky resource  we check for each pair “activity-resource" if some resource's involvement in the execution of an activity mainly occurs in delayed cases
  • 14. Step 3: Identify the presence of PRI instances in a current case14  Input parameter: log (test set)  Compare the values for a current case against the thresholds of PRIs  Record a likelihood of a case delay (0 or 1)  if the number is higher than the value of the learned threshold t  if a ‘risky’ activity is present in the current case  If an activity is assigned to a ‘risky’ resource
  • 15. Implementation within the ProM framework 15 Event log ProM plug-in 1. Inputs: expected case duration 2. Learn cut-off thresholds for PRIs and Identify the presence of PRIs in cases 3. If any of the PRIs is identified in a case, we consider that there is a risk of delay 4. Compare predicted values with the real case durations Case ID PRI 1 PRI 2 PRI 3 PRI 4 PRI 5 PRI 6 PRI 7 PRI 8 Risk 1000 1 0 1 0 1 1 1 1 1 102 0 0 0 0 0 0 0 0 0 103 0 0 1 0 0 0 0 0 1 106 0 0 0 0 0 0 0 0 0 305 0 0 0 0 0 0 0 0 0 554 0 0 0 0 0 0 0 0 0 Delayed activity Multiple resources Activity repetitions
  • 16. Validation with real event logs Experimental setup 16  Hold-out cross-validation training and test sets (75:25)  “Random” split and “Time” split (4:2 months)  Evaluation of precision and recall  Precision: the fraction of cases predicted to be delayed that are actually delayed  Recall: the fraction of delayed cases that can be successfully predicted against the actually delayed cases  Data pre-processing:  Completed cases  Recent data  Separating cases that are executed in different contexts (e.g., different departments)
  • 17. Validation with real event logs Data sets 17  Six Data sets from Suncorp, a large Australian insurance company  Represent insurance claim processes from different organisational units Properties of data set A Properties of data sets B1-B5
  • 18. Validation with real event logs Results. Data set A. “Random” split experiment. 19 Legend: • 95%, 90%, 80% - desired precision levels • TP – True Positives (cases predicted correctly as delayed) • FP – False Positives (cases predicted to be delayed but are not delayed) • FN – False Negatives (delayed cases that are not predicted to be delayed) • TN – True Negatives (in time cases that are also not predicted to be delayed) • PRI 1: Atypical activity execution time • PRI 2: Atypical waiting time • PRI 3: Multiple activity repetitions • PRI 4: Presence of a “risky” activity • PRI 5: Multiple resource involvement • PRI 6: Atypical sub-process duration • PRI 7: High resource workload • PRI 8: Use of a “risky” resource
  • 19. Validation with real event logs Results. Data set A, “Time” split experiment. 20 Legend: • 95%, 90%, 80% - desired precision levels • TP – True Positives (cases predicted correctly as delayed) • FP – False Positives (cases predicted to be delayed but are not delayed) • FN – False Negatives (delayed cases that are not predicted to be delayed) • TN – True Negatives (in time cases that are also not predicted to be delayed) • PRI 1: Atypical activity execution time • PRI 2: Atypical waiting time • PRI 3: Multiple activity repetitions • PRI 4: Presence of a “risky” activity • PRI 5: Multiple resource involvement • PRI 6: Atypical sub-process duration • PRI 7: High resource workload • PRI 8: Use of a “risky” resource
  • 20. Data set A. “Random” split experiment (without configuration) 22
  • 21. Moment of delay prediction: motivation 23  Predicting delays early during a case’s execution is a highly desirable capability  Early risk detection enables risk mitigation:  Risk elimination (e.g. reallocation of an activity to other resource)  Reduction of impact (e.g. adding additional resources in a case to decrease extent of delay)
  • 22. Moment of delay prediction Data set A, Random split, 90% precision level 24 x: The number of days since the beginning of a case when the risk of the case delay was discovered. y: The cumulative number of delay predictions at a certain point in time
  • 23. Observations from the experiments 25 • Good predictors in all data sets: • PRI 1: Atypical activity execution time • PRI 2: Atypical waiting time • PRI 6: Atypical sub-process duration • Good predictors in some data sets: • PRI 3: Multiple activity repetitions • PRI 4: Presence of a ‘risky’ activity • PRI 7: High resource workload • PRI 8: Use of a ‘risky’ resource • Early predictions: • PRI 4: Presence of a ‘risky’ activity • PRI 7: High resource workload • PRI 8: Use of a ‘risky’ resource • Limitations of the data: • High process variability in data sets B1-B5 • No complete information about resource workload • Limitations of the approach: • Assumption that a process is in a steady state • External context is not considered
  • 24. Conclusions and Future work 26  A method for predicting case delays with a high degree of precision  Utilise eight process risk indicators  Calibrate the threshold values for risk indicators using log data  Predict the likelihood of case delays using current case and log data  Experiments showed that this approach  decreases the level of false positive alerts,  significantly improves the precision of case delay predictions,  can predict case delays before a certain deadline  Future work:  Investigating the relation between PRIs and the extent of the expected delay  Alternative approaches: neural networks, decision trees  Applying the technique to other types of risks (e.g., budget overrun or low-quality output)
  • 25. PROFILING EVENT LOGS TO CONFIGURE RISK INDICATORS FOR PROCESS DELAYS Thank You! Questions? Email: m.wynn@qut.edu.au Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge, Arthur H. M. ter Hofstede, and Moe T. Wynn