Nothing Special   »   [go: up one dir, main page]

skip to main content
article

A comprehensive investigation of the applicability of process mining techniques for enterprise risk management

Published: 01 May 2013 Publication History

Abstract

Process mining techniques and tools perfectly complement the existing set of enterprise risk management approaches. Enterprise risk management aims at minimizing the negative effects of uncertainty on the objectives, while at the same time promoting the potential positive effects. Process mining research has proposed a broad range of techniques and tools that could be used to effectively support the activities related to the different phases of risk management. This paper contributes to the process mining and risk management research by providing a full exploration of the applicability of process mining in the context of the eight components of the COSO Enterprise Risk Management Framework. The identified applications will be illustrated based on the risks involved in insurance claim handling processes.

References

[1]
M.S. Beasly, B.C. Branson, B.V. Hancock, COSO's 2010 Report on ERM, Technical report, Committee of Sponsoring Organizations of the Treadway Commission, 2010.
[2]
Nocco, B.W. and Stulz, R.M., Enterprise risk management: theory and practice. Journal of Applied Corporate Finance. v18 i4. 8-20.
[3]
Power, M., Organized Uncertainty: Designing a World of Risk Management. 2007. Oxford University Press, Oxford.
[4]
Wu, D. and Olson, D.L., Enterprise risk management: small business scorecard analysis. Production Planning & Control. v120 i4. 269-362.
[5]
Wu, D., Xie, K. and Chen, G., Modeling technological innovation risks of an entrepreneurial team using system dynamics: an agent-based perspective. Technology Forecasting and Social Change. v77 i6. 857-869.
[6]
Wu, D. and Olson, D.L., Supply chain risk, simulation, and vendor selection. International Journal of Production Economics. v114 i2. 655-656.
[7]
Betz, S., Hickl, S. and Oberweis, A., Risk-aware business process modeling and simulation using XML nets. In: IEEE 13th Conference on Commerce and Enterprise Computing (CEC), pp. 349-356.
[8]
Rikhardsson, P., Peter, J., Green, P. and Rosemann, M., Business process risk management and internal control: a proposed research agenda in the context of compliance and ERP systems. In: Proceedings Second Asia/Pacific Research Symposium on Accounting Information Systems,
[9]
van der Aalst, W.M.P., Reijers, H.A., Weijters, A.J.M.M., van Dongen, B.F., Alves de Medeiros, A.K., Song, M. and Verbeek, H.M.W., Business process mining: an industrial application. Information Systems. v32 i5. 713-732.
[10]
Goedertier, S., De Weerdt, J., Martens, D., Vanthienen, J. and Baesens, B., Process discovery in event logs: an application in the telecom industry. Applied Soft Computing. v11 i2. 1697-1710.
[11]
van der Aalst, W.M.P. and Weijters, A., Process mining: a research agenda. Computers in Industry. v53 i3. 231-244.
[12]
van der Aalst, W.M.P. and van Dongen, B.F., Discovering workflow performance models from timed logs. In: Han, Y., Tai, S., Wikarski, D. (Eds.), International Conference on Engineering and Deployment of Cooperative Information Systems (EDCIS 2002), Lecture Notes in Computer Science, vol. 2480, Springer-Verlag, Berlin. pp. 45-63.
[13]
Wu, D. and Olson, D.L., Enterprise risk management: coping with model risk in a large bank. Journal of the Operational Research Society. v61 i2. 179-190.
[14]
Wu, D. and Birge, J.R., Serial chain merger evaluation model and application to mortgage banking. Decision Sciences. v43. 5-36.
[15]
van der Aalst, W.M.P., Weijters, T. and Maruster, L., Workflow mining: discovering process models from event logs. IEEE Transactions on Knowledge and Data Engineering. v16 i9. 1128-1142.
[16]
Goedertier, S., Martens, D., Vanthienen, J. and Baesens, B., Robust process discovery with artificial negative events. The Journal of Machine Learning Research. v10. 1305-1340.
[17]
van der Aalst, W.M.P., De beer, H.T. and van Dongen, B.F., Process mining and verification of properties: an approach based on temporal logic. In: On the Move to Meaningful Internet Systems 2005: CoopIS, DOA and ODBASE, Lecture Notes in Computer Sciences, vol. 3760, Springer-Verlag, Berlin. pp. 130-147.
[18]
van der Aalst, W.M.P. and Song, M., Mining social networks: uncovering interaction patterns in business processes. In: Proceedings of Business Process Management, pp. 244-260.
[19]
Ferreira, D.R., Applied sequence clustering techniques for process mining. 2009. IGI Global.
[20]
Similarity of business process models: metrics and evaluation. Information Systems. v36 i2. 498-516.
[21]
Caron, F., Vanthienen, J., De Weerdt, J. and Baesens, B., Advanced care-flow mining and analysis. In: Daniel, F., Barkaoui, K., Dustdar, S. (Eds.), Business Process Management Workshops, 99 of Lecture Notes in Business Information Processing, pp. 167-168.
[22]
Günther, C.W. and van der Aalst, W.M.P., Fuzzy mining - adaptive process simplification based on multi-perspective metrics. 2007. Business Process Management, Lecture Notes in Computer Sciences, 2007.Springer-Verlag, Berlin.
[23]
A. Weijters, W.M.P. van der Aalst, A.K.A. de Medeiros, Process mining with the heuristics miner-algorithm, Technical report, Technische Universiteit Eindhoven, vol. 166, 2006.
[24]
Jagadeesh Chandra Bose, R.P. and van der Aalst, W.M.P., Process diagnostics using trace alignment: opportunities, issues and challenges. Information Systems. v37 i2. 117-141.
[25]
Montali, M., Declarative process mining. 2010. Springer.
[26]
Committee of Sponsoring Organizations of the Treadway Commission, Enterprise Risk Management - Integrated Framework. 2004. AICPA, New Jersey.
[27]
Wynn, M., Rozinat, A., van der Aalst, W.M.P., Hofstede, A. and Fidge, C., Modern Business Process Automation. 2010. Springer.
[28]
Risk mapping and key risk indicators in operational risk management. Economic Notes. v34 i2. 231-256.
[29]
http://www.econ.kuleuven.be/public/N09032/publications/Risk%20Management/
[30]
Wu, D. and Olson, D.L., Enterprise risk management: a DEA VaR approach in vendor selection. International Journal of Production Research. v48 i16. 4919-4932.
[31]
Vasarhelyi, M.A., Alles, M.G. and Kogan, A., Principles of analytic monitoring for continuous assurance. Journal of Emerging Technologies in Accounting. v1 i1. 1-21.

Cited By

View all
  • (2019)Process mining techniques and applications – A systematic mapping studyExpert Systems with Applications: An International Journal10.1016/j.eswa.2019.05.003133:C(260-295)Online publication date: 1-Nov-2019
  1. A comprehensive investigation of the applicability of process mining techniques for enterprise risk management

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Computers in Industry
    Computers in Industry  Volume 64, Issue 4
    May, 2013
    134 pages

    Publisher

    Elsevier Science Publishers B. V.

    Netherlands

    Publication History

    Published: 01 May 2013

    Author Tags

    1. Business process analytics
    2. Business rules
    3. Enterprise risk management
    4. Process mining
    5. Process-aware information systems

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Process mining techniques and applications – A systematic mapping studyExpert Systems with Applications: An International Journal10.1016/j.eswa.2019.05.003133:C(260-295)Online publication date: 1-Nov-2019

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media