SlideShare a Scribd company logo
1 of 25
Download to read offline
PROFILING EVENT LOGS TO CONFIGURE
RISK INDICATORS FOR PROCESS DELAYS
25th International Conference on Advanced Information Systems Engineering,
Valencia, Spain
21 June 2013
Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge,
Arthur H. M. ter Hofstede, and Moe T. Wynn
Queensland University of Technology & Eindhoven University of Technology
Presenter: Moe T. Wynn
Risk-aware Business Process Management
2
“It will investigate, evaluate and enhance current approaches for the
identification, analysis, evaluation, treatment, and overall management of
risk as it relates to business processes”
BPM lifecycle
ARC Discovery Grant Project 2011-2013. Risk-aware business process management
ISO 31000:9000
Risk Management Process
3
Process-related risk is one that threatens the achievement of one or
more process goals
 A negative effect in terms of timeliness, cost, or quality of the
outcome.
 Is caused by any combination of process design, resource
behaviour, or case-data.
 E.g., Breaching SLA agreements in terms of completion times,
over-running agreed budgets, producing low-quality outputs
.
International Organization for Standardization. Risk management: vocabulary = Management
du risque: vocabulaire (ISO guide 73). Geneva, 2009.
Process-related risk
Risk - “effect of uncertainty on objectives” where “an effect is a
deviation from the expected - positive and/or negative.”
Research Scope
4
 Objective: Develop techniques for identification of process-
related risks
 Time-based process related risk: Case Delays
Question: Can we identify the risk of case delays by
analyzing the behaviour of a process?
<a, b, c, d, e>
<a, b, c, d, e>
<a, b, c, c, c, c, d, e>
<a, b, c, d, e>
<a, b, c, d, e>
When an activity is repeated multiple
times, the likelihood of a case delay is high.
Starting point: exploiting event log data
5
 Modern organisations automate their business processes and processes’
execution data is usually recorded in event logs.
 Process mining provides techniques and tools that help to extract
knowledge about processes from event logs.
Research Approach
6
Goal: develop a method that can identify the risk of
delay for cases with a high degree of precision
 This idea was presented at BPI 2012 workshop [14]
Define Process
Risk Indicators
(PRIs)
Configure PRIs
Identify the
presence of PRI
instances in a
current case
Step 1: Define Process Risk Indicators
7
 Process Risk Indicator (PRI) - a pattern observable in an event log whose presence
indicates a higher likelihood of some process-related risk.
Activity-based PRIs
PRI3: Multiple activity repetitions PRI4: Presence of a “risky” activity
PRI1: Atypical activity execution time PRI2: Atypical waiting time
PRI 6: Atypical sub-process duration
Activity Resource
A R1
B R23
C R12
D R11
E R5
F R4
- -
Process Risk Indicators (Resource-based)
8
Resource-based PRIs
PRI5: Multiple resource involvement PRI7: High resource workload
PRI8: Use of a “risky” resource
Activity Resource
A R1
B R1
C R1
D R1
E R5
F R4
- -
Activity Resource
A R1
B R1
C R111
D R1
E R5
F R4
- -
PRI instantiation from logs: approach in [14]
9
 “Sample standard deviations” approach for outlier detection:
 Cut-off thresholds for a PRI:
 Limitations:
 Assumption of a normal distribution
 Assumption that any atypical behavior is “risky”
 E.g., a large variation in execution time of a short activity has the same impact
on case delay predictions as those of a long activity
 Results:
 Indicators can predict case delays but obtained a high level of false
positive predictions
 cases that are predicted to be late but in the end are not
Step 2: Configure Process Risk Indicators
10
 Motivation: calibrate PRIs so that process semantics are considered
 How: using information about the known outcomes from cases in the
past (whether they are delayed or completed on time)
 Learn the threshold values for PRIs for a desired precision level
 Input parameter: precision level – 80%, 85%, 90%
 Input parameter: a log (training set)
Example of configuring PRI 1:
“Atypical activity duration”
11
 If the duration of activity A is more than t days there is a high risk of the
case delay.
10?
20?
??
To define t:
2. Calculate for each value in C precision of delay predictions in the training set:
• If activity A was executed for more than 12 days 60% of cases were delayed
• If activity A was executed for more than 16 days 90% of cases were delayed …
3. Assign t the smallest value from C that allows predicting delays with a
desired degree of precision.
• t = 16 if we would like 90% precision level
10
12 14
18
16
20
…
C
1. Define a pool of candidates C
including values:
Example of configuring PRI 5:
“Multiple resource involvement”
12
 If more than t resources are involved in a case there is a high risk of the
case delay.
5?
8?
??
To define t:
2. Calculate for each value in C precision of delay predictions in the training
set:
• If more than 7 resources were involved 80% of cases were delayed
• If more than 8 resources were involved 95% of cases were delayed …
3. Assign t the smallest value from C that allows predicting delays with a
desired degree of precision.
• t = 8
3
4 7
8
5
9
…
C
1. Define a pool of candidates C
including values:
Configuring other PRIs
13
 Activity-based PRIs: PRI 1, 2, 3, 6
 Resource-based PRIs: PRI 5, 7
 PRI 4: Presence of a risky activity
 we check if there exists an activity that is executed mainly in
delayed cases
 PRI 8: Use of a risky resource
 we check for each pair “activity-resource" if some resource's
involvement in the execution of an activity mainly occurs in
delayed cases
Step 3: Identify the presence of PRI
instances in a current case14
 Input parameter: log (test set)
 Compare the values for a current case against the thresholds
of PRIs
 Record a likelihood of a case delay (0 or 1)
 if the number is higher than the value of the learned threshold t
 if a ‘risky’ activity is present in the current case
 If an activity is assigned to a ‘risky’ resource
Implementation within the ProM framework
15
Event log
ProM plug-in
1. Inputs: expected case duration
2. Learn cut-off thresholds for PRIs and Identify the presence of PRIs in cases
3. If any of the PRIs is identified in a case, we consider that there is a risk of delay
4. Compare predicted values with the real case durations
Case ID PRI 1 PRI 2 PRI 3 PRI 4 PRI 5 PRI 6 PRI 7 PRI 8 Risk
1000 1 0 1 0 1 1 1 1 1
102 0 0 0 0 0 0 0 0 0
103 0 0 1 0 0 0 0 0 1
106 0 0 0 0 0 0 0 0 0
305 0 0 0 0 0 0 0 0 0
554 0 0 0 0 0 0 0 0 0
Delayed
activity
Multiple
resources
Activity
repetitions
Validation with real event logs
Experimental setup
16
 Hold-out cross-validation training and test sets (75:25)
 “Random” split and “Time” split (4:2 months)
 Evaluation of precision and recall
 Precision: the fraction of cases predicted to be delayed that are actually
delayed
 Recall: the fraction of delayed cases that can be successfully predicted
against the actually delayed cases
 Data pre-processing:
 Completed cases
 Recent data
 Separating cases that are executed in different contexts (e.g., different
departments)
Validation with real event logs
Data sets
17
 Six Data sets from Suncorp, a large Australian insurance company
 Represent insurance claim processes from different organisational units
Properties of data set A
Properties of data sets B1-B5
Validation with real event logs
Results. Data set A. “Random” split experiment.
19
Legend:
• 95%, 90%, 80% - desired precision levels
• TP – True Positives (cases predicted
correctly as delayed)
• FP – False Positives (cases predicted to be
delayed but are not delayed)
• FN – False Negatives (delayed cases that
are not predicted to be delayed)
• TN – True Negatives (in time cases that
are also not predicted to be delayed)
• PRI 1: Atypical activity execution time
• PRI 2: Atypical waiting time
• PRI 3: Multiple activity repetitions
• PRI 4: Presence of a “risky” activity
• PRI 5: Multiple resource involvement
• PRI 6: Atypical sub-process duration
• PRI 7: High resource workload
• PRI 8: Use of a “risky” resource
Validation with real event logs
Results. Data set A, “Time” split experiment.
20
Legend:
• 95%, 90%, 80% - desired precision levels
• TP – True Positives (cases predicted correctly as
delayed)
• FP – False Positives (cases predicted to be
delayed but are not delayed)
• FN – False Negatives (delayed cases that are not
predicted to be delayed)
• TN – True Negatives (in time cases that are also
not predicted to be delayed)
• PRI 1: Atypical activity execution time
• PRI 2: Atypical waiting time
• PRI 3: Multiple activity repetitions
• PRI 4: Presence of a “risky” activity
• PRI 5: Multiple resource involvement
• PRI 6: Atypical sub-process duration
• PRI 7: High resource workload
• PRI 8: Use of a “risky” resource
Data set A. “Random” split experiment (without
configuration)
22
Moment of delay prediction: motivation
23
 Predicting delays early during a case’s execution is a
highly desirable capability
 Early risk detection enables risk mitigation:
 Risk elimination (e.g. reallocation of an activity to other
resource)
 Reduction of impact (e.g. adding additional resources in a
case to decrease extent of delay)
Moment of delay prediction
Data set A, Random split, 90% precision level
24
x: The number of days since the beginning of a case when the risk of the case delay
was discovered.
y: The cumulative number of delay predictions at a certain point in time
Observations from the experiments
25
• Good predictors in all data sets:
• PRI 1: Atypical activity execution time
• PRI 2: Atypical waiting time
• PRI 6: Atypical sub-process duration
• Good predictors in some data sets:
• PRI 3: Multiple activity repetitions
• PRI 4: Presence of a ‘risky’ activity
• PRI 7: High resource workload
• PRI 8: Use of a ‘risky’ resource
• Early predictions:
• PRI 4: Presence of a ‘risky’ activity
• PRI 7: High resource workload
• PRI 8: Use of a ‘risky’ resource
• Limitations of the data:
• High process variability in data
sets B1-B5
• No complete information about
resource workload
• Limitations of the approach:
• Assumption that a process is in a
steady state
• External context is not
considered
Conclusions and Future work
26
 A method for predicting case delays with a high degree of precision
 Utilise eight process risk indicators
 Calibrate the threshold values for risk indicators using log data
 Predict the likelihood of case delays using current case and log data
 Experiments showed that this approach
 decreases the level of false positive alerts,
 significantly improves the precision of case delay predictions,
 can predict case delays before a certain deadline
 Future work:
 Investigating the relation between PRIs and the extent of the expected
delay
 Alternative approaches: neural networks, decision trees
 Applying the technique to other types of risks (e.g., budget overrun or
low-quality output)
PROFILING EVENT LOGS TO CONFIGURE
RISK INDICATORS FOR PROCESS DELAYS
Thank You! Questions?
Email: m.wynn@qut.edu.au
Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge,
Arthur H. M. ter Hofstede, and Moe T. Wynn

More Related Content

Viewers also liked

From Low-Level Events to Activities - A Pattern based Approach
From Low-Level Events to Activities - A Pattern based ApproachFrom Low-Level Events to Activities - A Pattern based Approach
From Low-Level Events to Activities - A Pattern based ApproachFelix Mannhardt
 
Ariu - Ph.D. Defense Slides
Ariu - Ph.D. Defense SlidesAriu - Ph.D. Defense Slides
Ariu - Ph.D. Defense SlidesPluribus One
 
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisation
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisationLearning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisation
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisationTore Hoel
 
Investigation of Geometric Process Control
Investigation of Geometric Process ControlInvestigation of Geometric Process Control
Investigation of Geometric Process ControlTian Lin
 
Privacy in Learning Analytics – Implications for System Architecture
Privacy in Learning Analytics – Implications for System ArchitecturePrivacy in Learning Analytics – Implications for System Architecture
Privacy in Learning Analytics – Implications for System ArchitectureTore Hoel
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIDES Editor
 
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...yousef emami
 
Analytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène LyonAnalytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène LyonNRB
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data miningbalbeerrawat
 
Using Alarm Clustering to Minimise Intensive Care Unit False Alarms
Using Alarm Clustering to Minimise Intensive Care Unit False AlarmsUsing Alarm Clustering to Minimise Intensive Care Unit False Alarms
Using Alarm Clustering to Minimise Intensive Care Unit False AlarmsGearoid Lennon
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
IMS Health Workshop World Orphan Drug Congress
IMS Health Workshop World Orphan Drug CongressIMS Health Workshop World Orphan Drug Congress
IMS Health Workshop World Orphan Drug CongressIMSHealthRWES
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachSoftServe
 
IMS Health Clinical Trial Optimization Solutions
IMS Health Clinical Trial Optimization SolutionsIMS Health Clinical Trial Optimization Solutions
IMS Health Clinical Trial Optimization SolutionsQuintilesIMS
 
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...Thoughtworks
 
Big Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businessesBig Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businessesGopalakrishna Palem
 
CBGTBT - Part 4 - Mining
CBGTBT - Part 4 - MiningCBGTBT - Part 4 - Mining
CBGTBT - Part 4 - MiningBlockstrap.com
 

Viewers also liked (19)

From Low-Level Events to Activities - A Pattern based Approach
From Low-Level Events to Activities - A Pattern based ApproachFrom Low-Level Events to Activities - A Pattern based Approach
From Low-Level Events to Activities - A Pattern based Approach
 
Ariu - Ph.D. Defense Slides
Ariu - Ph.D. Defense SlidesAriu - Ph.D. Defense Slides
Ariu - Ph.D. Defense Slides
 
Project
ProjectProject
Project
 
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisation
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisationLearning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisation
Learning Analytics – Opportunities for ISO/IEC JTC 1/SC36 standardisation
 
Investigation of Geometric Process Control
Investigation of Geometric Process ControlInvestigation of Geometric Process Control
Investigation of Geometric Process Control
 
Privacy in Learning Analytics – Implications for System Architecture
Privacy in Learning Analytics – Implications for System ArchitecturePrivacy in Learning Analytics – Implications for System Architecture
Privacy in Learning Analytics – Implications for System Architecture
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction Technique
 
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
 
Analytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène LyonAnalytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène Lyon
 
Agile data visualisation
Agile data visualisationAgile data visualisation
Agile data visualisation
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data mining
 
Using Alarm Clustering to Minimise Intensive Care Unit False Alarms
Using Alarm Clustering to Minimise Intensive Care Unit False AlarmsUsing Alarm Clustering to Minimise Intensive Care Unit False Alarms
Using Alarm Clustering to Minimise Intensive Care Unit False Alarms
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
IMS Health Workshop World Orphan Drug Congress
IMS Health Workshop World Orphan Drug CongressIMS Health Workshop World Orphan Drug Congress
IMS Health Workshop World Orphan Drug Congress
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric Approach
 
IMS Health Clinical Trial Optimization Solutions
IMS Health Clinical Trial Optimization SolutionsIMS Health Clinical Trial Optimization Solutions
IMS Health Clinical Trial Optimization Solutions
 
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...
Big Data Agile Analytics by Ken Collier - Director Agile Analytics, Thoughtwo...
 
Big Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businessesBig Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businesses
 
CBGTBT - Part 4 - Mining
CBGTBT - Part 4 - MiningCBGTBT - Part 4 - Mining
CBGTBT - Part 4 - Mining
 

Similar to Moe wynn caise13 presentation

Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09Júlio Venâncio
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006Tim Bass
 
Procedural Risk Management
Procedural Risk ManagementProcedural Risk Management
Procedural Risk ManagementLouis A. Poulin
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.pptabhichowdary16
 
Examples of working with streaming data
Examples of working with streaming dataExamples of working with streaming data
Examples of working with streaming dataYi-Shin Chen
 
Fluency Introduction Deck - October, 23, 2017
Fluency Introduction Deck - October, 23, 2017Fluency Introduction Deck - October, 23, 2017
Fluency Introduction Deck - October, 23, 2017Collin Miles
 
Methods for handling deadlock
Methods for handling deadlockMethods for handling deadlock
Methods for handling deadlocksangrampatil81
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Interset
 
Big data and Process Safety
Big data and Process Safety Big data and Process Safety
Big data and Process Safety cvandr4
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessTim Bass
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...Splunk
 
Crime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCCrime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCAzavea
 
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...Interset
 
Risk Based Approach To Recovery And Continuity Management John P Morency
Risk Based Approach To Recovery And Continuity Management   John P  MorencyRisk Based Approach To Recovery And Continuity Management   John P  Morency
Risk Based Approach To Recovery And Continuity Management John P Morencyjmorency1952
 
Data Provenance for Data Science
Data Provenance for Data ScienceData Provenance for Data Science
Data Provenance for Data SciencePaolo Missier
 
The Event Crowd: A Novel Approach for Crowd-Enabled Event Processing
The Event Crowd: A Novel Approach for Crowd-Enabled Event ProcessingThe Event Crowd: A Novel Approach for Crowd-Enabled Event Processing
The Event Crowd: A Novel Approach for Crowd-Enabled Event ProcessingPiyush Yadav
 
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber SecurityAFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber SecurityDjindo Lee
 
D1 design and analysis approaches to evaluate cardiovascular risk - 2012 eugm
D1   design and analysis approaches to evaluate cardiovascular risk - 2012 eugmD1   design and analysis approaches to evaluate cardiovascular risk - 2012 eugm
D1 design and analysis approaches to evaluate cardiovascular risk - 2012 eugmtherealreverendbayes
 
Eugm 2012 gaydos - design and analysis approaches to evaluate cardiovascula...
Eugm 2012   gaydos - design and analysis approaches to evaluate cardiovascula...Eugm 2012   gaydos - design and analysis approaches to evaluate cardiovascula...
Eugm 2012 gaydos - design and analysis approaches to evaluate cardiovascula...Cytel USA
 

Similar to Moe wynn caise13 presentation (20)

Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
 
Procedural Risk Management
Procedural Risk ManagementProcedural Risk Management
Procedural Risk Management
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
 
Examples of working with streaming data
Examples of working with streaming dataExamples of working with streaming data
Examples of working with streaming data
 
Fluency Introduction Deck - October, 23, 2017
Fluency Introduction Deck - October, 23, 2017Fluency Introduction Deck - October, 23, 2017
Fluency Introduction Deck - October, 23, 2017
 
Methods for handling deadlock
Methods for handling deadlockMethods for handling deadlock
Methods for handling deadlock
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
 
Big data and Process Safety
Big data and Process Safety Big data and Process Safety
Big data and Process Safety
 
Data farmers
Data farmersData farmers
Data farmers
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusiness
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
 
Crime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCCrime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UC
 
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
 
Risk Based Approach To Recovery And Continuity Management John P Morency
Risk Based Approach To Recovery And Continuity Management   John P  MorencyRisk Based Approach To Recovery And Continuity Management   John P  Morency
Risk Based Approach To Recovery And Continuity Management John P Morency
 
Data Provenance for Data Science
Data Provenance for Data ScienceData Provenance for Data Science
Data Provenance for Data Science
 
The Event Crowd: A Novel Approach for Crowd-Enabled Event Processing
The Event Crowd: A Novel Approach for Crowd-Enabled Event ProcessingThe Event Crowd: A Novel Approach for Crowd-Enabled Event Processing
The Event Crowd: A Novel Approach for Crowd-Enabled Event Processing
 
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber SecurityAFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
 
D1 design and analysis approaches to evaluate cardiovascular risk - 2012 eugm
D1   design and analysis approaches to evaluate cardiovascular risk - 2012 eugmD1   design and analysis approaches to evaluate cardiovascular risk - 2012 eugm
D1 design and analysis approaches to evaluate cardiovascular risk - 2012 eugm
 
Eugm 2012 gaydos - design and analysis approaches to evaluate cardiovascula...
Eugm 2012   gaydos - design and analysis approaches to evaluate cardiovascula...Eugm 2012   gaydos - design and analysis approaches to evaluate cardiovascula...
Eugm 2012 gaydos - design and analysis approaches to evaluate cardiovascula...
 

More from caise2013vlc

Markus keuneke partial data-models
Markus keuneke   partial data-modelsMarkus keuneke   partial data-models
Markus keuneke partial data-modelscaise2013vlc
 
Jelena zdravkovic c ai-se 2013 capability caas
Jelena zdravkovic  c ai-se 2013 capability caasJelena zdravkovic  c ai-se 2013 capability caas
Jelena zdravkovic c ai-se 2013 capability caascaise2013vlc
 
Sagar sen caise2013final
Sagar sen caise2013finalSagar sen caise2013final
Sagar sen caise2013finalcaise2013vlc
 
David aguilera presentation
David aguilera   presentationDavid aguilera   presentation
David aguilera presentationcaise2013vlc
 
Sonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalSonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalcaise2013vlc
 
Suriadi caise2013 slides
Suriadi caise2013 slidesSuriadi caise2013 slides
Suriadi caise2013 slidescaise2013vlc
 
Fadila caise2013 vf
Fadila caise2013 vfFadila caise2013 vf
Fadila caise2013 vfcaise2013vlc
 
Henning agt talk-caise-semnet
Henning agt   talk-caise-semnetHenning agt   talk-caise-semnet
Henning agt talk-caise-semnetcaise2013vlc
 
Michael mrissa c aise
Michael mrissa c aiseMichael mrissa c aise
Michael mrissa c aisecaise2013vlc
 
Razvan petrusel presentation caise 2013
Razvan petrusel   presentation caise 2013Razvan petrusel   presentation caise 2013
Razvan petrusel presentation caise 2013caise2013vlc
 
Ramezani taghiabadi temporal compliance checking 2
Ramezani taghiabadi   temporal compliance checking 2Ramezani taghiabadi   temporal compliance checking 2
Ramezani taghiabadi temporal compliance checking 2caise2013vlc
 
Ferreira c ai-se2013-final-handouts
Ferreira   c ai-se2013-final-handoutsFerreira   c ai-se2013-final-handouts
Ferreira c ai-se2013-final-handoutscaise2013vlc
 
Sonja meyer caise 2013
Sonja meyer caise 2013Sonja meyer caise 2013
Sonja meyer caise 2013caise2013vlc
 
Tony clark caise 13-presentation
Tony clark  caise 13-presentationTony clark  caise 13-presentation
Tony clark caise 13-presentationcaise2013vlc
 
Miguel goulao 2013 c-aise
Miguel goulao 2013 c-aiseMiguel goulao 2013 c-aise
Miguel goulao 2013 c-aisecaise2013vlc
 
Jorge cardoso caise-usdl-tosca-2013-06-18c
Jorge cardoso   caise-usdl-tosca-2013-06-18cJorge cardoso   caise-usdl-tosca-2013-06-18c
Jorge cardoso caise-usdl-tosca-2013-06-18ccaise2013vlc
 
Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_caise2013vlc
 
Ignacio panach ormeño et-al_caise2013
Ignacio panach   ormeño et-al_caise2013Ignacio panach   ormeño et-al_caise2013
Ignacio panach ormeño et-al_caise2013caise2013vlc
 
Peter sawyer caise
Peter sawyer  caisePeter sawyer  caise
Peter sawyer caisecaise2013vlc
 

More from caise2013vlc (20)

Caise panel
Caise panelCaise panel
Caise panel
 
Markus keuneke partial data-models
Markus keuneke   partial data-modelsMarkus keuneke   partial data-models
Markus keuneke partial data-models
 
Jelena zdravkovic c ai-se 2013 capability caas
Jelena zdravkovic  c ai-se 2013 capability caasJelena zdravkovic  c ai-se 2013 capability caas
Jelena zdravkovic c ai-se 2013 capability caas
 
Sagar sen caise2013final
Sagar sen caise2013finalSagar sen caise2013final
Sagar sen caise2013final
 
David aguilera presentation
David aguilera   presentationDavid aguilera   presentation
David aguilera presentation
 
Sonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalSonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_final
 
Suriadi caise2013 slides
Suriadi caise2013 slidesSuriadi caise2013 slides
Suriadi caise2013 slides
 
Fadila caise2013 vf
Fadila caise2013 vfFadila caise2013 vf
Fadila caise2013 vf
 
Henning agt talk-caise-semnet
Henning agt   talk-caise-semnetHenning agt   talk-caise-semnet
Henning agt talk-caise-semnet
 
Michael mrissa c aise
Michael mrissa c aiseMichael mrissa c aise
Michael mrissa c aise
 
Razvan petrusel presentation caise 2013
Razvan petrusel   presentation caise 2013Razvan petrusel   presentation caise 2013
Razvan petrusel presentation caise 2013
 
Ramezani taghiabadi temporal compliance checking 2
Ramezani taghiabadi   temporal compliance checking 2Ramezani taghiabadi   temporal compliance checking 2
Ramezani taghiabadi temporal compliance checking 2
 
Ferreira c ai-se2013-final-handouts
Ferreira   c ai-se2013-final-handoutsFerreira   c ai-se2013-final-handouts
Ferreira c ai-se2013-final-handouts
 
Sonja meyer caise 2013
Sonja meyer caise 2013Sonja meyer caise 2013
Sonja meyer caise 2013
 
Tony clark caise 13-presentation
Tony clark  caise 13-presentationTony clark  caise 13-presentation
Tony clark caise 13-presentation
 
Miguel goulao 2013 c-aise
Miguel goulao 2013 c-aiseMiguel goulao 2013 c-aise
Miguel goulao 2013 c-aise
 
Jorge cardoso caise-usdl-tosca-2013-06-18c
Jorge cardoso   caise-usdl-tosca-2013-06-18cJorge cardoso   caise-usdl-tosca-2013-06-18c
Jorge cardoso caise-usdl-tosca-2013-06-18c
 
Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_
 
Ignacio panach ormeño et-al_caise2013
Ignacio panach   ormeño et-al_caise2013Ignacio panach   ormeño et-al_caise2013
Ignacio panach ormeño et-al_caise2013
 
Peter sawyer caise
Peter sawyer  caisePeter sawyer  caise
Peter sawyer caise
 

Recently uploaded

Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Recently uploaded (20)

Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

Moe wynn caise13 presentation

  • 1. PROFILING EVENT LOGS TO CONFIGURE RISK INDICATORS FOR PROCESS DELAYS 25th International Conference on Advanced Information Systems Engineering, Valencia, Spain 21 June 2013 Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge, Arthur H. M. ter Hofstede, and Moe T. Wynn Queensland University of Technology & Eindhoven University of Technology Presenter: Moe T. Wynn
  • 2. Risk-aware Business Process Management 2 “It will investigate, evaluate and enhance current approaches for the identification, analysis, evaluation, treatment, and overall management of risk as it relates to business processes” BPM lifecycle ARC Discovery Grant Project 2011-2013. Risk-aware business process management ISO 31000:9000 Risk Management Process
  • 3. 3 Process-related risk is one that threatens the achievement of one or more process goals  A negative effect in terms of timeliness, cost, or quality of the outcome.  Is caused by any combination of process design, resource behaviour, or case-data.  E.g., Breaching SLA agreements in terms of completion times, over-running agreed budgets, producing low-quality outputs . International Organization for Standardization. Risk management: vocabulary = Management du risque: vocabulaire (ISO guide 73). Geneva, 2009. Process-related risk Risk - “effect of uncertainty on objectives” where “an effect is a deviation from the expected - positive and/or negative.”
  • 4. Research Scope 4  Objective: Develop techniques for identification of process- related risks  Time-based process related risk: Case Delays Question: Can we identify the risk of case delays by analyzing the behaviour of a process? <a, b, c, d, e> <a, b, c, d, e> <a, b, c, c, c, c, d, e> <a, b, c, d, e> <a, b, c, d, e> When an activity is repeated multiple times, the likelihood of a case delay is high.
  • 5. Starting point: exploiting event log data 5  Modern organisations automate their business processes and processes’ execution data is usually recorded in event logs.  Process mining provides techniques and tools that help to extract knowledge about processes from event logs.
  • 6. Research Approach 6 Goal: develop a method that can identify the risk of delay for cases with a high degree of precision  This idea was presented at BPI 2012 workshop [14] Define Process Risk Indicators (PRIs) Configure PRIs Identify the presence of PRI instances in a current case
  • 7. Step 1: Define Process Risk Indicators 7  Process Risk Indicator (PRI) - a pattern observable in an event log whose presence indicates a higher likelihood of some process-related risk. Activity-based PRIs PRI3: Multiple activity repetitions PRI4: Presence of a “risky” activity PRI1: Atypical activity execution time PRI2: Atypical waiting time PRI 6: Atypical sub-process duration
  • 8. Activity Resource A R1 B R23 C R12 D R11 E R5 F R4 - - Process Risk Indicators (Resource-based) 8 Resource-based PRIs PRI5: Multiple resource involvement PRI7: High resource workload PRI8: Use of a “risky” resource Activity Resource A R1 B R1 C R1 D R1 E R5 F R4 - - Activity Resource A R1 B R1 C R111 D R1 E R5 F R4 - -
  • 9. PRI instantiation from logs: approach in [14] 9  “Sample standard deviations” approach for outlier detection:  Cut-off thresholds for a PRI:  Limitations:  Assumption of a normal distribution  Assumption that any atypical behavior is “risky”  E.g., a large variation in execution time of a short activity has the same impact on case delay predictions as those of a long activity  Results:  Indicators can predict case delays but obtained a high level of false positive predictions  cases that are predicted to be late but in the end are not
  • 10. Step 2: Configure Process Risk Indicators 10  Motivation: calibrate PRIs so that process semantics are considered  How: using information about the known outcomes from cases in the past (whether they are delayed or completed on time)  Learn the threshold values for PRIs for a desired precision level  Input parameter: precision level – 80%, 85%, 90%  Input parameter: a log (training set)
  • 11. Example of configuring PRI 1: “Atypical activity duration” 11  If the duration of activity A is more than t days there is a high risk of the case delay. 10? 20? ?? To define t: 2. Calculate for each value in C precision of delay predictions in the training set: • If activity A was executed for more than 12 days 60% of cases were delayed • If activity A was executed for more than 16 days 90% of cases were delayed … 3. Assign t the smallest value from C that allows predicting delays with a desired degree of precision. • t = 16 if we would like 90% precision level 10 12 14 18 16 20 … C 1. Define a pool of candidates C including values:
  • 12. Example of configuring PRI 5: “Multiple resource involvement” 12  If more than t resources are involved in a case there is a high risk of the case delay. 5? 8? ?? To define t: 2. Calculate for each value in C precision of delay predictions in the training set: • If more than 7 resources were involved 80% of cases were delayed • If more than 8 resources were involved 95% of cases were delayed … 3. Assign t the smallest value from C that allows predicting delays with a desired degree of precision. • t = 8 3 4 7 8 5 9 … C 1. Define a pool of candidates C including values:
  • 13. Configuring other PRIs 13  Activity-based PRIs: PRI 1, 2, 3, 6  Resource-based PRIs: PRI 5, 7  PRI 4: Presence of a risky activity  we check if there exists an activity that is executed mainly in delayed cases  PRI 8: Use of a risky resource  we check for each pair “activity-resource" if some resource's involvement in the execution of an activity mainly occurs in delayed cases
  • 14. Step 3: Identify the presence of PRI instances in a current case14  Input parameter: log (test set)  Compare the values for a current case against the thresholds of PRIs  Record a likelihood of a case delay (0 or 1)  if the number is higher than the value of the learned threshold t  if a ‘risky’ activity is present in the current case  If an activity is assigned to a ‘risky’ resource
  • 15. Implementation within the ProM framework 15 Event log ProM plug-in 1. Inputs: expected case duration 2. Learn cut-off thresholds for PRIs and Identify the presence of PRIs in cases 3. If any of the PRIs is identified in a case, we consider that there is a risk of delay 4. Compare predicted values with the real case durations Case ID PRI 1 PRI 2 PRI 3 PRI 4 PRI 5 PRI 6 PRI 7 PRI 8 Risk 1000 1 0 1 0 1 1 1 1 1 102 0 0 0 0 0 0 0 0 0 103 0 0 1 0 0 0 0 0 1 106 0 0 0 0 0 0 0 0 0 305 0 0 0 0 0 0 0 0 0 554 0 0 0 0 0 0 0 0 0 Delayed activity Multiple resources Activity repetitions
  • 16. Validation with real event logs Experimental setup 16  Hold-out cross-validation training and test sets (75:25)  “Random” split and “Time” split (4:2 months)  Evaluation of precision and recall  Precision: the fraction of cases predicted to be delayed that are actually delayed  Recall: the fraction of delayed cases that can be successfully predicted against the actually delayed cases  Data pre-processing:  Completed cases  Recent data  Separating cases that are executed in different contexts (e.g., different departments)
  • 17. Validation with real event logs Data sets 17  Six Data sets from Suncorp, a large Australian insurance company  Represent insurance claim processes from different organisational units Properties of data set A Properties of data sets B1-B5
  • 18. Validation with real event logs Results. Data set A. “Random” split experiment. 19 Legend: • 95%, 90%, 80% - desired precision levels • TP – True Positives (cases predicted correctly as delayed) • FP – False Positives (cases predicted to be delayed but are not delayed) • FN – False Negatives (delayed cases that are not predicted to be delayed) • TN – True Negatives (in time cases that are also not predicted to be delayed) • PRI 1: Atypical activity execution time • PRI 2: Atypical waiting time • PRI 3: Multiple activity repetitions • PRI 4: Presence of a “risky” activity • PRI 5: Multiple resource involvement • PRI 6: Atypical sub-process duration • PRI 7: High resource workload • PRI 8: Use of a “risky” resource
  • 19. Validation with real event logs Results. Data set A, “Time” split experiment. 20 Legend: • 95%, 90%, 80% - desired precision levels • TP – True Positives (cases predicted correctly as delayed) • FP – False Positives (cases predicted to be delayed but are not delayed) • FN – False Negatives (delayed cases that are not predicted to be delayed) • TN – True Negatives (in time cases that are also not predicted to be delayed) • PRI 1: Atypical activity execution time • PRI 2: Atypical waiting time • PRI 3: Multiple activity repetitions • PRI 4: Presence of a “risky” activity • PRI 5: Multiple resource involvement • PRI 6: Atypical sub-process duration • PRI 7: High resource workload • PRI 8: Use of a “risky” resource
  • 20. Data set A. “Random” split experiment (without configuration) 22
  • 21. Moment of delay prediction: motivation 23  Predicting delays early during a case’s execution is a highly desirable capability  Early risk detection enables risk mitigation:  Risk elimination (e.g. reallocation of an activity to other resource)  Reduction of impact (e.g. adding additional resources in a case to decrease extent of delay)
  • 22. Moment of delay prediction Data set A, Random split, 90% precision level 24 x: The number of days since the beginning of a case when the risk of the case delay was discovered. y: The cumulative number of delay predictions at a certain point in time
  • 23. Observations from the experiments 25 • Good predictors in all data sets: • PRI 1: Atypical activity execution time • PRI 2: Atypical waiting time • PRI 6: Atypical sub-process duration • Good predictors in some data sets: • PRI 3: Multiple activity repetitions • PRI 4: Presence of a ‘risky’ activity • PRI 7: High resource workload • PRI 8: Use of a ‘risky’ resource • Early predictions: • PRI 4: Presence of a ‘risky’ activity • PRI 7: High resource workload • PRI 8: Use of a ‘risky’ resource • Limitations of the data: • High process variability in data sets B1-B5 • No complete information about resource workload • Limitations of the approach: • Assumption that a process is in a steady state • External context is not considered
  • 24. Conclusions and Future work 26  A method for predicting case delays with a high degree of precision  Utilise eight process risk indicators  Calibrate the threshold values for risk indicators using log data  Predict the likelihood of case delays using current case and log data  Experiments showed that this approach  decreases the level of false positive alerts,  significantly improves the precision of case delay predictions,  can predict case delays before a certain deadline  Future work:  Investigating the relation between PRIs and the extent of the expected delay  Alternative approaches: neural networks, decision trees  Applying the technique to other types of risks (e.g., budget overrun or low-quality output)
  • 25. PROFILING EVENT LOGS TO CONFIGURE RISK INDICATORS FOR PROCESS DELAYS Thank You! Questions? Email: m.wynn@qut.edu.au Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge, Arthur H. M. ter Hofstede, and Moe T. Wynn