<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Software Framework for Risk-Aware Business Process Management</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ra aele Conforti</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marcello La Rosa</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Arthur H.M. ter Hofstede</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giancarlo Fortino</string-name>
          <email>g.fortino@unical.it</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Massimiliano de Leoni</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wil M.P. van der Aalst</string-name>
          <email>w.m.p.v.d.aalstg@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michael Adams</string-name>
          <email>mj.adamsg@qut.edu.au</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Eindhoven University of Technology</institution>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>NICTA Queensland Lab</institution>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Queensland University of Technology</institution>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Universita` della Calabria</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>With the large di usion of Business Process Management (BPM) automation suites, the possibility of managing process-related risks arises. This paper introduces an innovative framework for process-related risk management and describes a working implementation realized by extending the YAWL system. The framework covers three aspects of risk management: risk monitoring, risk prevention, and risk mitigation. Risk monitoring functionality is provided using a sensor-based architecture, where sensors are defined at design time and used at run-time for monitoring purposes. Risk prevention functionality is provided in the form of suggestions about what should be executed, by who, and how, through the use of decision trees. Finally, risk mitigation functionality is provided as a sequence of remedial actions (e.g. reallocating, skipping, rolling back of a work item) that should be executed to restore the process to a normal situation.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        Companies are exposed to risks on a daily basis. Some of these risks may eventuate
during the execution of business processes, for example due to a missed deadline or
because the accrued cost may have exceeded an estimated budget threshold. We call this
type of risk process-related risk. Ideally, every business process management system
(BPMS) would provide process-related risk management capabilities covering the three
main aspects of risk management: risk monitoring, risk prevention and risk mitigation.
However, while commercial BPMSs [
        <xref ref-type="bibr" rid="ref5 ref8">5,8</xref>
        ] already provide monitoring functionalities
that can be used for risk monitoring, nothing more than this is currently available. An
extensive literature review in the area of risk-aware BPM has been carried out in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], from
it emerged how so far research on risk-aware BPM manly focuses on the design-time
phase.
      </p>
      <p>In this paper we present a framework5 for risk management which not only provides
features for risk monitoring but also for risk prevention and risk mitigation. The
framework is composed of three main components, one for each aspect of risk management.
5 available at http://www.yawlfoundation.org
The idea behind this framework is to enrich the business process management (BPM)
life cycle with elements of risks management (see Fig. 1). Specifically, in the Process
Design phase a business process model will be mapped with risks identified during the
Risk Identification phase. During the Process Implementation phase these risks will be
linked to specific elements of the process, e.g. resources (also known as actors), tasks,
or data. In the Process Enactment phase, a risk-aware BPMS will execute the process,
allowing the identification and treatment of risks during the Process Diagnosis phase.</p>
      <p>Risk monitoring features are
provided through a sensor-based archi- Riskm-aondneoltsated 2 ImpPlermoceenstastion Riswko-arknfnloowtasted
tecture. Sensors are defined at design Risimk-palweamreenwtaotriokfnlow
time by specifying a risk condition
that needs to be monitored, and are IdenRtifiisckation Risks 1 Process Design 3 EPnarocctmesesnt
aaficgetesivrt.haTteehadedamtserinuninsso-ttrriammtoearbnwyahgaeesnreonanlsseooromnfotahtnie-- Risk analysis ReportingprocReissks-mawoadreel ing4PRroiscckehmsasintigDgeaisatigonnosis workRfpliorsokwCc-ueaerswrxseeandcrtaeutation
sensors detects a risk. A risk eventu- Riskchparenvgeenstion Riskcmoonntriotolriinngg and prHoicsetossricdaalta
ates if the risk likelihood associated
with it exceeds a risk threshold de- Fig. 1. Risk-Aware BPM Lifecycle
fined at design time. The risk
threshold indicates the risk level that a company is willing to accept.</p>
      <p>Risk prevention features are provided in the form of suggestions given to a resource
while performing a process instance. The system, using decision trees, produces an
estimation of the final risk level associated with each work item a resource may perform
at a given moment, suggesting the work item with the lowest risk level to be executed.
The system also provides support during the execution of a work item, by providing a
predicted risk level based on the data values provided by a resource.</p>
      <p>Finally, risk mitigation features are provided in the form of a mitigation strategy.
When a notification is received, the administrator can request a mitigation strategy. In
this case, the system uses a simulated annealing algorithm to identify a sequence of
mitigation actions (e.g. reallocating, skipping, rolling back of a work item) that need
to be executed in order to bring the process instance to a situation in which the risk
likelihood is below the given threshold.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Risk Monitoring</title>
      <p>
        Developed for flexibility, the sensor-based architecture provides for the monitoring of
business processes via the definition of sensors. While the use of sensors to monitor
business processes is not novel (see. e.g. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]), the methodology behind the architecture is
original, as is the functionality provided by the definition language [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>The architecture allows monitoring through two phases (see Fig. 2): a design time
phase, during which sensors are defined, and a run-time phase, during which a process
instance is monitored by an instance of each sensor defined for such a process.</p>
      <p>Conditions are defined through the use of variables and operations that specify what
a sensor must monitor. These variables can be subdivided in three groups: i) status,
providing information about status, times, number of execution, etc. of a work item;
Sensor-based Architecture - PostCameraReady</p>
      <p>Process
model</p>
      <p>Process
case
Define sensor</p>
      <p>EnacMtoPdroelcess</p>
      <p>Register sensor</p>
      <p>Process
logs</p>
      <p>For each sensor
Monitor sensor</p>
      <p>Updadteatsaensor
Trigger
occurred</p>
      <p>Sufficdieantat Chceocnkdsiteionnsor</p>
      <p>Insudfafitcaient
Sensor</p>
      <p>Sennsootrfucolfnildeitdion</p>
      <p>Sensor
cofnudlfiitlioedn notSifeicnadtion
Process instance
completed
ii) value, the value of a data variable used during the execution of a process instance
(for example the shipping cost of an order processed during the execution of an Issue
Shipment Payment Order); and iii) resource, supplying information about the availability
of a resource. Moreover, sensors are not limited to running instances, but can also collect
information from completed instances and group them together to obtain aggregate
information i.e. probabilities or frequencies. Finally, each sensor can have a trigger
defined, which could be an event, e.g. work item completion, or a timer, e.g. every 5
seconds.</p>
      <p>
        The runtime phase verifies and BPMS
Dr La Rosa Mdarecetloects any changes to the process, 1 of 1
while monitoring for the violation of iMnto.fnaictoer
specified conditions. Each condition Monitor service
is evaluated against the values the
relevant variables have been assigned DB
duriTnghethaercehxietceucttiuorne o(fsetheeFpirgo.c3e)ssi.s Process logs int.face Sensor Manager Sensors
realized as a custom service of the Engine
YAWL Environment [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The YAWL int.face
Editor (see Fig. 4) was extended to Process engine
provide new features that make it
possible to easily identify variables and Fig. 3. System-Engine interactions
create risk conditions for the
definition of new sensors, or to edit existing sensors. The editor also provides the ability to
import risk conditions using a set, that can be extended by the user, of fourteen predefined
templates. Figure 5 provides a screenshot of the wizard used during the creation of a risk
sensor based on a template.
      </p>
      <p>At the core of the architecture is the Sensor Manager, which provides for the creation
of sensors and the interaction between sensors and YAWL system. The Sensor Manager
contains three di erent interfaces, which interact with the YAWL engine, its logging
database and the YAWL monitor service respectively. Once registered with the YAWL
Engine, the Sensor Manager retrieves the process specification, initializes the sensors
and keeps track of the execution of process instances. Periodically, using the update time
specified at design time or whenever an event is triggered, the service notifies the sensors
of the changes that have occurred in the process instance and the relevant data values
23.09.2011
retrieved from the process logs. Every time a sensor receives an update, it verifies the
sensing condition. If the condition is violated the sensor notifies the Monitor Service
which will notify the administrator marking the instance as “Risky”. Similarly, if the
condition of an instance marked as “Risky” is no longer violated, the sensor will notify
the Monitor Service which will mark the instance as “Safe”.
Risk prediction functionality is provided in the form of support for risk-informed
decisions during the execution of business processes. Each time a resource needs to execute
(or is executing) a work item, the system provides information about the level of risk
that will be reached at the completion of the process instance through the execution of
that particular work item.</p>
      <p>
        The system predicts the final level of risk by using decision trees as described in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
Once started, the system analyzes the log of the BPMS and generates a decision tree for
each possible choice that may be taken (i.e. work item execution).
      </p>
      <p>Figure 6 shows the architecture of this component. It is an independent service that
on the one hand communicates with the BPMS, in this case the YAWL system, to retrieve
the process model and its execution log, while on the other hand communicates with the
resource handler to provide suggestions in the form or risk level associated with each
work item. The process model is used to discover decision points (i.e. task), while the log
is used to mine a decision tree for each decision point discovered, where each leaf of a
decision tree represents a fault level that a process instance may reach at its completion.</p>
      <p>
        Once the component is initialized and all decision trees are built they are used at
run-time to provide suggestions, which are visualized using a map-based workflow
handler [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] (see Fig. 7). The suggestion visualizations are based on the expected risk
level of each choice, based on the predicted fault level that will be reached by taking that
choice times the frequency with which the prediction has previously proven correct.
      </p>
      <p>During the execution of a process, a resource will be exposed to two types of
suggestions. Figure 7 is a screenshot of the map-based workflow handler, where a
resource will choose which work item to execute. The map-based workflow handler
provides a graphical visualization of the process model, with dots on enabled work items.
These dots represent the final risk level expected if the work item is executed. The color
of each dot ranges from white, meaning a risk level equal to zero, to black, denoting a
certain fault. These dots also grow in size, where the size of the dots reflects the number
of work items actually enabled.
The second type of suggestion to which a resource can be exposed provides assistance
during the execution of a work item, in particular with the completion of its form-based
data fields. Figure 8 shows a screenshot taken during the completion of a form. By
clicking on the “Predict” button each time a new value is entered into a form field, the
system will update the graded bar on the right, indicating the revised final risk level.
To do so, the system will send the values entered on the form to the risk prevention
component of the service, which will then use this information to navigate the decision
tree associated with that particular work item and return the calculated risk level.
4</p>
    </sec>
    <sec id="sec-3">
      <title>Risk Mitigation</title>
      <p>The last component of our framework is the risk mitigation component, which interacts
with the risk monitoring component and it is invoked by an administrator whenever a
risk sensor detects a risk and the administrator considers it necessary to start a mitigation
strategy.</p>
      <p>
        Once a mitigation strategy is requested, this component will retrieve the status of
each risk sensor involved in the monitoring of that specific process instance. These
statuses are used to create a “virtual” environment in which mitigation strategies can be
simulated in order to discover the optimal mitigation strategy. A mitigation strategy is
composed of a sequence of mitigation actions that need to be executed in order to restore
the process instance to a situation in which the risk no longer exceeds the tolerance
threshold. These mitigation actions are atomic operations that work on the level of the
single work item. Examples of mitigation actions are the rollback of a work item or the
reallocation of a work item to another resource (for the complete list of mitigation action
we refer to [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]).
      </p>
      <p>
        To evaluate the best mitigation strategy, the risk mitigation component uses a
simulated annealing algorithm [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The algorithm finds the sequence of mitigation actions
that minimizes the risk level of each risk defined for that particular process, and the cost
of the mitigation strategy (each mitigation action has a behavioral cost that needs to be
considered). Finally, the best five solutions discovered are returned to the administrator
who can then decide which one to apply.
5
      </p>
    </sec>
    <sec id="sec-4">
      <title>Tool Maturity</title>
      <p>
        The framework proposed in this paper has been tested with business process models from
di erent domains, such as logistics, insurance and movie making processes, and with
real and artificial logs. Each component of the framework exposes a di erent level of
maturity. The monitoring component is the most advanced component. Tests have shown
good results in terms of time performance, in general between a few milliseconds and a
few seconds for the time required to identify a potential risk (based on the complexity
of the risk condition) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. It was also used by several students in Italy and Australia
in the context of university courses on process automation. This component was also
tested with a sample of users in order to measure its usability and easy of use [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The
results showed that the component helps modelers to understand the risks involved with
a process, particularly when the modelers have limited experience. A limitation that
arose from the study is that the language used for defining risk conditions was perceived
as being too complex.
      </p>
      <p>
        The risk prevention component was tested with artificial data and, at the time of
writing, is being tested with real data. The utility of the visualization framework was
tested in a separate work [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>Finally, the risk mitigation component is the least mature one. It is currently not
possible to automatically execute all the potential mitigation actions proposed as part of
a mitigation strategy, and in particular a rollback on the system. This limitation means
the component may propose a solution that cannot actually be executed. We are currently
addressing this limitation.
6</p>
    </sec>
    <sec id="sec-5">
      <title>Demo Script</title>
      <p>This demo will provide an overview of the tool, showing each of the available features.
The demo targets BPMS users such as business analysts and process participants, as
well as researchers interested in the intersection between risk management and process
management. The demo will show how to define a risk sensor from scratch using one of
the available templates, and how to create a new template. After the definition of a risk
sensor, a process instance will be executed to show how the system can support process
participants in making risk-informed decisions by o ering contextual suggestions, and
how it is be able to detect potential risks and trigger warnings for process administrators.
The demo will conclude with the discovery of a possible mitigation strategy.
Acknowledgments This research is funded by the ARC Discovery Project “Risk-aware
Business Process Management” (DP110100091).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>R.</given-names>
            <surname>Conforti</surname>
          </string-name>
          , M. de Leoni,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          , and
          <string-name>
            <surname>W.M.P. van der Aalst.</surname>
          </string-name>
          <article-title>Supporting risk-informed decisions during business process execution</article-title>
          .
          <source>In Proc. of CAiSE</source>
          , LNCS. Springer,
          <year>2013</year>
          . To appear.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>R.</given-names>
            <surname>Conforti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. H. M. ter Hofstede</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Recker</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Adams</surname>
          </string-name>
          .
          <article-title>Real-time risk monitoring in business processes: A sensor-based approach</article-title>
          .
          <source>BPM Center Report BPM-12-23</source>
          , BPMcenter.org,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>R.</given-names>
            <surname>Conforti</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. H. M. ter Hofstede</surname>
            ,
            <given-names>M. La</given-names>
          </string-name>
          <string-name>
            <surname>Rosa</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Adams</surname>
          </string-name>
          .
          <article-title>Automated risk mitigation in business processes</article-title>
          .
          <source>In Proc. of CoopIS</source>
          , volume
          <volume>7565</volume>
          <source>of LNCS</source>
          . Springer,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>M. de Leoni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Adams</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , and
          <string-name>
            <surname>A. H. M. ter Hofstede</surname>
          </string-name>
          .
          <article-title>Visual support for work assignment in process-aware information systems: Framework formalisation and implementation</article-title>
          .
          <source>Decision Support Systems</source>
          ,
          <volume>54</volume>
          (
          <issue>1</issue>
          ):
          <fpage>345</fpage>
          -
          <lpage>361</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Oracle. BPEL Process Manager Developer's Guide</surname>
          </string-name>
          , http://download.oracle.com/docs/cd/ E15523 01/integration.1111/e10224/bp sensors.
          <source>htm. Accessed: Jun</source>
          .
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>K.I. Smith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.M.</given-names>
            <surname>Everson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.E.</given-names>
            <surname>Fieldsend</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Murphy</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Misra</surname>
          </string-name>
          .
          <article-title>Dominance-based multiobjective simulated annealing</article-title>
          .
          <source>Evolutionary Computation</source>
          ,
          <source>IEEE Trans. on</source>
          ,
          <volume>12</volume>
          (
          <issue>3</issue>
          ),
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>S.</given-names>
            <surname>Suriadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Weiß</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Winkelmann</surname>
          </string-name>
          , A. ter
          <string-name>
            <surname>Hofstede</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Wynn</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Ouyang</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Conforti</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Fidge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>La Rosa, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Pika</surname>
          </string-name>
          .
          <article-title>Current research in risk-aware business process management - overview, comparison, and gap analysis</article-title>
          .
          <source>BPM Center Report BPM-12- 13</source>
          , BPMcenter.org,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Sybase</surname>
          </string-name>
          .
          <article-title>Sybase CEP Implementation Methodology for Continuous Intelligence</article-title>
          , http://www.sybase.com.au/files/White Papers/
          <article-title>Sybase CEP Implementation Methodology wp</article-title>
          .
          <source>pdf. Accessed: Jun</source>
          .
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Arthur H. M. ter Hofstede</surname>
          </string-name>
          ,
          <string-name>
            <surname>Wil M. P. van der Aalst</surname>
            , Michael Adams, and
            <given-names>Nick</given-names>
          </string-name>
          <string-name>
            <surname>Russell</surname>
          </string-name>
          .
          <source>Modern Business Process Automation: YAWL and its Support Environment</source>
          . Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>