Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama Isao Echizen Jorge Munoz-Gama and Isao Echizen
Insuring Sensitive Processes through Process Mining
Insuring Scenario Insurance Company 3 Clients Service Provider ProcessesObjectsData
Insuring Sensitive Processes through Process Mining
What is a Process? 5 ABCDEF
Insuring Sensitive Processes through Process Mining
Process Mining in a Nutshell 7 THEORYREALITY
Process Mining in a Nutshell 8 THEORYREALITY REALITY REFLECTION LOGS
Process Mining Process mining is a process management technique that allows for the analysis of processes based on real event logs, and using formal models. Process Mining: Discovery, Conformance and Enhancement of Business Processes by W.M.P. van der Aalst, Springer Verlag, 2011 (ISBN ). 9
Process Mining: Discovery, Conformance and Enhancement 10
Process Mining: Discovery, Conformance and Enhancement 11
Process Mining: Discovery, Conformance and Enhancement Info 1 Info1aInfo1b Info 2 Info2aInfo2b 12
Insurance Schema
Insurance Policy Architecture for Insuring Processes Formal Model as Policy Formalism and non ambiguity Variety of widely used model formalism: Petri nets, EPC, BPMN, BPEL, YAWL, … Graphical representation for an easy comprehension Wide range of formal techniques and software 14
Insurance Policy Architecture for Insuring Processes 15
Insurance Cycle based on Process Mining
Insurance Cycle 17
Modeling Alpha Miner Alpha ++ Genetic Miner Fuzzy Miner Genet ILMiner … 18 Process Mining DISCOVERY
Modeling (Example) 19
Petri Nets in a nutshell 20
Validation 21 Validate with know benchmarks The results are “compared” with the expected values Comparison not trivial because non model-driven execution Fitness based on alignments A* algorithm to find the optimal path on the model corresponding to each case Based on costs Process Mining CONFORMANCE * A. Adriansyah, B. F. van Dongen, and W. M. P. van der Aalst, “Conformance checking using cost-based fitness analysis,” in EDOC.
Validation 22 Optimal Alignment Execution
Forensic 23 A- posteriori Each trace = claim Same fitness conformance technique as before (based on alignments) Locate where the problem is and who is accountable
Forensic 24 Optimal Alignment Claim
Forensic 25
Re-design 26 Insurance Company not want to expose to much risk, i.e., insure the real process and only the real process (not all possible situations) The real process may change with the time (Concept Drifting) – so the policy agreement Conformance techniques to assess how precise is the model Precision dimension Based on “escaping points” Points where the model allows more behavior than the one reflected in the log Process Mining CONFORMANCE * J. Munoz-Gama and J. Carmona, “A fresh look at precision in process conformance” in BPM,.
Re-design 27
Implementation (ProM) Main Tool for Process Mining Extensible with plug-ins Platform independent Open-source and free Widely used by the industry and the researchers 28
Discovery Implementation 29 Alpha, Genetic, ILPMiner, …
Fitness Implementation PNetReplayer Package 30
Precision Implementation ETConformance Package 31
Conclusions and Future Work Insurance of Processes based on Process Mining Schema Based on Formal Model as Policy Cycle of insurance: modeling, validation, forensic and redesign Not only control flow dimension Other dimensions: roles, performance time, social organization, … 32
More Information 33 Process Mining: Discovery, Conformance and Enhancement of Business Processes by W.M.P. van der Aalst, Springer Verlag, 2011 (ISBN ). Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama and Isao Echizen Autonomic and Trusted Computing (ATC) 2012
Questions?
Thank You
Illustrative Example: Intro Online company providing a service to buy and sell cars between users Collect pictures and videos of the cars and distribute this contents to other users The sensitive process to be insured: the anonymization of the pictures and videos 36