Download presentation
Presentation is loading. Please wait.
Published bySabina Phillips Modified over 9 years ago
1
Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama Isao Echizen Jorge Munoz-Gama and Isao Echizen
2
Insuring Sensitive Processes through Process Mining
3
Insuring Scenario Insurance Company 3 Clients Service Provider ProcessesObjectsData
4
Insuring Sensitive Processes through Process Mining
5
What is a Process? 5 ABCDEF
6
Insuring Sensitive Processes through Process Mining
7
Process Mining in a Nutshell 7 THEORYREALITY
8
Process Mining in a Nutshell 8 THEORYREALITY REALITY REFLECTION LOGS
9
Process Mining Process mining is a process management technique that allows for the analysis of processes based on real event logs, and using formal models. Process Mining: Discovery, Conformance and Enhancement of Business Processes by W.M.P. van der Aalst, Springer Verlag, 2011 (ISBN 978-3-642-19344-6). 9
10
Process Mining: Discovery, Conformance and Enhancement 10
11
Process Mining: Discovery, Conformance and Enhancement 11
12
Process Mining: Discovery, Conformance and Enhancement Info 1 Info1aInfo1b Info 2 Info2aInfo2b 12
13
Insurance Schema
14
Insurance Policy Architecture for Insuring Processes Formal Model as Policy Formalism and non ambiguity Variety of widely used model formalism: Petri nets, EPC, BPMN, BPEL, YAWL, … Graphical representation for an easy comprehension Wide range of formal techniques and software 14
15
Insurance Policy Architecture for Insuring Processes 15
16
Insurance Cycle based on Process Mining
17
Insurance Cycle 17
18
Modeling Alpha Miner Alpha ++ Genetic Miner Fuzzy Miner Genet ILMiner … 18 Process Mining DISCOVERY
19
Modeling (Example) 19
20
Petri Nets in a nutshell 20
21
Validation 21 Validate with know benchmarks The results are “compared” with the expected values Comparison not trivial because non model-driven execution Fitness based on alignments A* algorithm to find the optimal path on the model corresponding to each case Based on costs Process Mining CONFORMANCE * A. Adriansyah, B. F. van Dongen, and W. M. P. van der Aalst, “Conformance checking using cost-based fitness analysis,” in EDOC.
22
Validation 22 Optimal Alignment Execution
23
Forensic 23 A- posteriori Each trace = claim Same fitness conformance technique as before (based on alignments) Locate where the problem is and who is accountable
24
Forensic 24 Optimal Alignment Claim
25
Forensic 25
26
Re-design 26 Insurance Company not want to expose to much risk, i.e., insure the real process and only the real process (not all possible situations) The real process may change with the time (Concept Drifting) – so the policy agreement Conformance techniques to assess how precise is the model Precision dimension Based on “escaping points” Points where the model allows more behavior than the one reflected in the log Process Mining CONFORMANCE * J. Munoz-Gama and J. Carmona, “A fresh look at precision in process conformance” in BPM,.
27
Re-design 27
28
Implementation (ProM) Main Tool for Process Mining Extensible with plug-ins Platform independent Open-source and free Widely used by the industry and the researchers 28 http://www.promtools.org/prom6/
29
Discovery Implementation 29 Alpha, Genetic, ILPMiner, …
30
Fitness Implementation PNetReplayer Package 30
31
Precision Implementation ETConformance Package 31
32
Conclusions and Future Work Insurance of Processes based on Process Mining Schema Based on Formal Model as Policy Cycle of insurance: modeling, validation, forensic and redesign Not only control flow dimension Other dimensions: roles, performance time, social organization, … 32
33
More Information 33 Process Mining: Discovery, Conformance and Enhancement of Business Processes by W.M.P. van der Aalst, Springer Verlag, 2011 (ISBN 978-3-642-19344-6). Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama and Isao Echizen Autonomic and Trusted Computing (ATC) 2012
34
Questions?
35
Thank You
36
Illustrative Example: Intro Online company providing a service to buy and sell cars between users Collect pictures and videos of the cars and distribute this contents to other users The sensitive process to be insured: the anonymization of the pictures and videos 36
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.