header
Local cover image
Local cover image
Image from OpenLibrary

Towards monitoring compliance of business processes / Iman Mohamed Atef Abdelazim Elsayed Helal ; Supervised Ali Hamed Elbastawissy , Ahmed Mahmoud Hany Aly Awad

By: Contributor(s): Material type: TextTextLanguage: English Publication details: Cairo : Iman Mohamed Atef Abdelazim Elsayed Helal , 2017Description: 143 Leaves : charts , facsimiles ; 30cmOther title:
  • نحو رصد القواعد الملزمة لإجراءات العمل [Added title page title]
Subject(s): Online resources: Available additional physical forms:
  • Issued also as CD
Dissertation note: Thesis (Ph.D.) - Cairo University - Faculty of Computers and Information - Department of Information Systems Summary: Business Process Management continues to gain much interest ever since the economic crisis that occurred in 2008. Many organizations are monitoring and auditing their own systems for detecting any violations, in order to avoid them. This has led many researches to address the issue of business processes monitoring at different business process life cycle phases specifically; design, configuration, enactment, and evaluation. However, monitoring business processes at enactment time has many challenges. Monitoring a large amount of event streams from different sources, in order to detect violations and maintain them, is one of the major challenges that need special event correlation techniques. Moreover, considering the human factor in performing unmanaged business processes, where tracing human behavior without a central execution engine for managing/orchestrating their tasks, can lead to the possibility of violations.Monitoring business processes plays a major role in conformance checking, compliance enforcement, risk management, and performance analysis. However, these techniques need a set of correlated events. Business process execution produces a set of events with basic information such as timestamp, activity name and case identifier. However, with the lack of a central orchestration execution engine, it is hard to correlate these events.In this research, we present two different approaches to fill the gap between the execution of uncorrelated events in acyclic and cyclic models, and the stack of techniques and approaches that need correlated events to conduct further analysis.These approaches induce a case identifier for each uncorrelated event with a high degree of trust at runtime. We provide two different approaches to fill this gap. One is by correlating events using a case decision tree and the other technique is by correlating events using the causal dependencies between activities and indexing techniques in a database management system
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Call number Copy number Status Barcode
Thesis Thesis قاعة الرسائل الجامعية - الدور الاول المكتبة المركزبة الجديدة - جامعة القاهرة Cai01.20.04.Ph.D.2017.Im.T (Browse shelf(Opens below)) Not for loan 01010110073232000
CD - Rom CD - Rom مخـــزن الرســائل الجـــامعية - البدروم المكتبة المركزبة الجديدة - جامعة القاهرة Cai01.20.04.Ph.D.2017.Im.T (Browse shelf(Opens below)) 73232.CD Not for loan 01020110073232000

Thesis (Ph.D.) - Cairo University - Faculty of Computers and Information - Department of Information Systems

Business Process Management continues to gain much interest ever since the economic crisis that occurred in 2008. Many organizations are monitoring and auditing their own systems for detecting any violations, in order to avoid them. This has led many researches to address the issue of business processes monitoring at different business process life cycle phases specifically; design, configuration, enactment, and evaluation. However, monitoring business processes at enactment time has many challenges. Monitoring a large amount of event streams from different sources, in order to detect violations and maintain them, is one of the major challenges that need special event correlation techniques. Moreover, considering the human factor in performing unmanaged business processes, where tracing human behavior without a central execution engine for managing/orchestrating their tasks, can lead to the possibility of violations.Monitoring business processes plays a major role in conformance checking, compliance enforcement, risk management, and performance analysis. However, these techniques need a set of correlated events. Business process execution produces a set of events with basic information such as timestamp, activity name and case identifier. However, with the lack of a central orchestration execution engine, it is hard to correlate these events.In this research, we present two different approaches to fill the gap between the execution of uncorrelated events in acyclic and cyclic models, and the stack of techniques and approaches that need correlated events to conduct further analysis.These approaches induce a case identifier for each uncorrelated event with a high degree of trust at runtime. We provide two different approaches to fill this gap. One is by correlating events using a case decision tree and the other technique is by correlating events using the causal dependencies between activities and indexing techniques in a database management system

Issued also as CD

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image