Anomaly detection using process mining

85Citations
Citations of this article
163Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, certifications and manuals for best practices of governance were developed, and in some cases, tougher federal laws were implemented (e.g. the Sarboness Oxley Act). Companies adhered to these changes adopting the best practices for corporate governance by deploying Process Aware Information Systems (PAISs) to automate their business processes. However, these companies demand a rapid response to strategic changes, so the adoption of normative PAISs may compromise their competitiveness. On one hand companies need flexible PAISs for competitiveness reasons. On the other hand flexibility may compromise security of system because users can execute tasks that could result into violation of financial loses. In order to re-balance this trade-off, we present in this work how ProM tools can support anomaly detection in logs of PAIS. Besides, we present the results of the application of our approach with a real case. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Bezerra, F., Wainer, J., & Van Der Aalst, W. M. P. (2009). Anomaly detection using process mining. In Lecture Notes in Business Information Processing (Vol. 29 LNBIP, pp. 149–161). Springer Verlag. https://doi.org/10.1007/978-3-642-01862-6_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free