1 / 35

Insuring Sensitive Processes through Process Mining

Insuring Sensitive Processes through Process Mining. Jorge Munoz-Gama and Isao Echizen. Insuring Sensitive Processes through Process Mining. Insurance Company. Insuring Scenario. Clients. Objects. Data. Processes. Service Provider.

hedia
Download Presentation

Insuring Sensitive Processes through Process Mining

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama andIsao Echizen

  2. Insuring Sensitive Processes through Process Mining

  3. Insurance Company Insuring Scenario Clients Objects Data Processes Service Provider

  4. Insuring Sensitive Processes through Process Mining

  5. What is a Process? A B C D E F

  6. Insuring Sensitive Processes through Process Mining

  7. Process Mining in a Nutshell THEORY REALITY

  8. Process Mining in a Nutshell REALITY REFLECTION ? ? LOGS THEORY REALITY

  9. Process Mining • Process mining is a process management technique that allows for the analysis of processes based on real event logs, and using formal models. Process Mining: Discovery, Conformance and Enhancement of Business Processes by W.M.P. van der Aalst, Springer Verlag, 2011 (ISBN 978-3-642-19344-6).

  10. Process Mining: Discovery, Conformance and Enhancement Conformance Discovery Enhancement

  11. Process Mining: Discovery, Conformance and Enhancement Conformance Discovery Enhancement

  12. Process Mining: Discovery, Conformance and Enhancement Conformance Discovery Enhancement

  13. Insurance Schema

  14. Architecture for Insuring Processes • Formal Model as Policy • Formalism and non ambiguity • Variety of widely used model formalism: Petri nets, EPC, BPMN, BPEL, YAWL, … • Graphical representation for an easy comprehension • Wide range of formal techniques and software Insurance Policy

  15. Architecture for Insuring Processes Insurance Policy

  16. Insurance Cycle based on Process Mining

  17. Insurance Cycle

  18. Alpha Miner • Alpha ++ • Genetic Miner • Fuzzy Miner • Genet • ILMiner • … Modeling Process Mining DISCOVERY

  19. Modeling (Example)

  20. Petri Nets in a nutshell

  21. Validation • Validate with know benchmarks • The results are “compared” with the expected values • Comparison not trivial because non model-driven execution • Fitness based on alignments • A* algorithm to find the optimal path on the model corresponding to each case • Based on costs Process Mining CONFORMANCE • * A. Adriansyah, B. F. van Dongen, and W. M. P. van der Aalst, “Conformance checking using cost-based fitness analysis,” in EDOC.

  22. Validation Execution Optimal Alignment

  23. A- posteriori • Each trace = claim • Same fitness conformance technique as before • (based on alignments) • Locate where the problem is and who is accountable Forensic

  24. Forensic Claim Optimal Alignment

  25. Forensic

  26. Insurance Company not want to expose to much risk, i.e., insure the real process and only the real process (not all possible situations) • The real process may change with the time (Concept Drifting) – so the policy agreement • Conformance techniques to assess how precise is the model • Precision dimension • Based on “escaping points” • Points where the model allows more behavior than the one reflected in the log Re-design Process Mining CONFORMANCE • * J. Munoz-Gama and J. Carmona, “A fresh look at precision in process conformance” in BPM,.

  27. Re-design

  28. Implementation (ProM) • Main Tool for Process Mining • Extensible with plug-ins • Platform independent • Open-source and free • Widely used by the industry and the researchers http://www.promtools.org/prom6/

  29. Discovery Implementation • Alpha, Genetic, ILPMiner, …

  30. Fitness Implementation • PNetReplayer Package

  31. Precision Implementation • ETConformance Package

  32. Conclusions and Future Work • Insurance of Processes based on Process Mining • Schema Based on Formal Model as Policy • Cycle of insurance: • modeling, validation, forensic and redesign • Not only control flow dimension • Other dimensions: roles, performance time, social organization, …

  33. More Information Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama and Isao Echizen Autonomic and Trusted Computing(ATC) 2012 Process Mining: Discovery, Conformance and Enhancement of Business Processes by W.M.P. van der Aalst, Springer Verlag, 2011 (ISBN 978-3-642-19344-6).

  34. Questions?

  35. Thank You

More Related