Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/CEC.2011.58guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Risk-Aware Business Process Modeling and Simulation Using XML Nets

Published: 05 September 2011 Publication History

Abstract

Risk management and business process management are considered key success factors for organizations. Risks are part of every business activity. If a risk occurs it may threaten the organizational goals causing time delays, additional costs or loss of quality. A business process is a set of activities that are executed according to certain rules to achieve a predefined business goal. Thus, if risk occurs it may threaten the execution of business processes. Nevertheless, in traditional business process management approaches risks and business processes are not sufficiently integrated. Risks are usually not explicitly described in the relevant business process model. In order to realize risk-aware business process management, one must have the process risks conceptualized and integrated into business process modeling and simulation. Thus, we present a novel methodology of risk-aware business process modeling and simulation using so-called XML nets, which are a special variant of Petri nets. Additionally, we present a business process modeling tool extended by a risk-aware perspective. Our methodology includes the following four steps: initial modeling of the original business process, discovering the business process risks by applying selected risk identification techniques, integrated modeling of risks and business processes, simulation and evaluation of business process improvements and their systematic selection and transformation of the original business process model into an improved business process model. Our novel methodology enables better risk visibility, improves business processes, and ensures business continuity.

Cited By

View all
  • (2019)Enabling change-driven workflows in continuous information security managementProceedings of the 34th ACM/SIGAPP Symposium on Applied Computing10.1145/3297280.3297468(1924-1933)Online publication date: 8-Apr-2019
  • (2019)A comprehensive investigation of the applicability of process mining techniques for enterprise risk managementComputers in Industry10.1016/j.compind.2013.02.00164:4(464-475)Online publication date: 1-Jan-2019
  • (2018)A Survey of Risk-Aware Business Process ModellingInternational Journal of Risk and Contingency Management10.4018/IJRCM.20170701026:3(14-26)Online publication date: 13-Dec-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CEC '11: Proceedings of the 2011 IEEE 13th Conference on Commerce and Enterprise Computing
September 2011
436 pages
ISBN:9780769545356

Publisher

IEEE Computer Society

United States

Publication History

Published: 05 September 2011

Author Tags

  1. Petri nets
  2. business process management
  3. business process modeling and simulation
  4. risk management

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Enabling change-driven workflows in continuous information security managementProceedings of the 34th ACM/SIGAPP Symposium on Applied Computing10.1145/3297280.3297468(1924-1933)Online publication date: 8-Apr-2019
  • (2019)A comprehensive investigation of the applicability of process mining techniques for enterprise risk managementComputers in Industry10.1016/j.compind.2013.02.00164:4(464-475)Online publication date: 1-Jan-2019
  • (2018)A Survey of Risk-Aware Business Process ModellingInternational Journal of Risk and Contingency Management10.4018/IJRCM.20170701026:3(14-26)Online publication date: 13-Dec-2018

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media