Skip to main content

2007 | Buch

Business Process Management

5th International Conference, BPM 2007, Brisbane, Australia, September 24-28, 2007. Proceedings

herausgegeben von: Gustavo Alonso, Peter Dadam, Michael Rosemann

Verlag: Springer Berlin Heidelberg

Buchreihe : Lecture Notes in Computer Science

insite
SUCHEN

Inhaltsverzeichnis

Frontmatter

Business Process Maturity and Performance

The Process-Oriented Organisation: A Holistic View Developing a Framework for Business Process Orientation Maturity
Abstract
Processes are the core of organisations. Business Process Management (BPM) argues organisations can gain competitive advantage by improving and innovating their processes through a holistic process-oriented view. An organisation can be more or less process-oriented depending on their experience in applying process thinking for better results. The aim of this paper is to define a framework for identifying characteristics of Business Process Orientation and to provide a valid tool for measuring the degree of Business Process Orientation (BPO) of an organisation based on empirical research in 30 international organisations. A holistic view on integrated process management and change is taken as a starting point.
Peter Willaert, Joachim Van den Bergh, Jurgen Willems, Dirk Deschoolmeester
Challenges in Business Performance Measurement: The Case of a Corporate IT Function
Abstract
Contemporary organisations are increasingly adopting performance measurement activity to assess their level of achievement of strategic objectives and delivery of stakeholder value. This qualitative research sought to increase understanding of the challenges involved in this area. An in-depth case study of the corporate IT services unit of a global company highlighted key challenges pertaining to: (i) deriving value from performance measurement practices; (ii) establishing appropriate and useful performance measures; (iii) implementing effective information collation and dashboard practices. The need to transform performance measurement from a tool for simply monitoring/reporting to one of learning what factors drive results (so as to be able to influence these factors) is suggested as a way to increase the value derived from such practices. This is seen to imply a need to rethink major notions of balance and strategic relevance that have been advanced hitherto as leading design principles.
Stephen Corea, Andy Watters
On the Performance of Workflow Processes with Distributed Actors: Does Place Matter?
Abstract
Current workflow technology offers rich features to manage and enact business processes. In principle, the technology enables actors to cooperate in the execution of business processes regardless of their geographical location. Furthermore, the technology is considered as an efficient means to reduce processing times. In this paper, we evaluate the effects on the performance of a workflow process in an organizational setting where actors are geographically distributed. The studied process is exceptional, because equivalent tasks can be performed at different locations. We have analyzed a large workflow process log with state-of-the art mining tools associated with the ProM framework. Our analysis leads to the conclusion that there is a positive effect on process performance when workflow actors are geographically close.
Hajo A. Reijers, Minseok Song, Byungduk Jeong

Business Process Modeling

What Makes Process Models Understandable?
Abstract
Despite that formal and informal quality aspects are of significant importance to business process modeling, there is only little empirical work reported on process model quality and its impact factors. In this paper we investigate understandability as a proxy for quality of process models and focus on its relations with personal and model characteristics. We used a questionnaire in classes at three European universities and generated several novel hypotheses from an exploratory data analysis. Furthermore, we interviewed practitioners to validate our findings. The results reveal that participants tend to exaggerate the differences in model understandability, that self-assessment of modeling competence appears to be invalid, and that the number of arcs in models has an important influence on understandability.
Jan Mendling, Hajo A. Reijers, Jorge Cardoso
Modeling of Task-Based Authorization Constraints in BPMN
Abstract
Workflows model and control the execution of business processes in an organisation by defining a set of tasks to be done. The specification of workflows is well-elaborated and heavily tool supported. Task-based access control is tailored to specify authorization constraints for task allocation in workflows. Existing workflow modeling notations do not support the description of authorization constraints for task allocation commonly referred to as resource allocation patterns.
In this paper we propose an extension for the Business Process Modeling Notation (BPMN) to express such authorizations within the workflow model, enabling the support of resource allocation pattern, such as Separation of Duty, Role-Based Allocation, Case Handling, or History-Based Allocation in BPMN. These pattern allow to specify authorization constraints, for instance role-task assignments, separation of duty, and binding of duty constraints. Based on a formal approach we develop an authorization constraint artifact for BPMN to describe such constraints.
As a pragmatic demonstration of the feasibility of our proposed extension we model authorization constraints inspired by a real world banking workflow scenario. In the course of this paper we identify several aspects of future work related to verification and consistency analysis of modeled authorization constraints, tool-supported and pattern-driven authorization constraint description, and automatic derivation of authorization policies, such as defined by the eXtensible Access Control Markup Language (XACML).
Christian Wolter, Andreas Schaad
BPMN: How Much Does It Cost? An Incremental Approach
Abstract
In this paper we propose some extensions of the business process modeling notation (BPMN) to be able to evaluate the overall cost of business process diagrams. The BPMN is very expressive, and a general treatment of this problem is very complex. Therefore, it seems reasonable to define classes of business process diagrams capturing real processes and to develop efficient analysis methods for these classes. In the paper we define some relevant subsets of the BPMN, extend them with the concept of cost, and provide computational models for each class, in most cases reducing them to existing problems for which efficient solutions already exist.
Matteo Magnani, Danilo Montesi
View-Based Process Visualization
Abstract
In large organizations different users or user roles have distinguished perspectives over business processes and related data. Personalized views of the managed processes are needed. Existing BPM tools, however, do not provide adequate mechanisms for building and visualizing such views. Very often processes are displayed to users in the same way as drawn by the process designer. To tackle this inflexibility this paper presents a visualization approach, which allows to create personalized process views based on well-defined, parameterizable operations. Respective view operations can be flexibly composed in order to reduce or aggregate process information in the desired way. This allows us to consider the specific needs of the respective applications (e.g., process monitoring tools or process editors). Altogether, the realized view concept enables advanced support for process visualization.
Ralph Bobrik, Manfred Reichert, Thomas Bauer

Case Studies

BPM on Top of SOA: Experiences from the Financial Industry
Abstract
Service Oriented Architecture (SOA) forms an ideal infrastructure for Business Process Management as applications are invoked using standard interfaces and protocols. Automatic services can be composed together with human tasks into complex business processes that cross departmental borders and integrate customer and partner processes. Despite the current hype around SOA and BPM, reports on industrial experiences are still very limited. This paper presents results from empirical studies on adopting BPM and SOA throughout the last 4 years in the IT organization of Danske Bank, one of the largest financial institutions in northern Europe and a pioneer in adopting SOA. The study shows the benefit from automating a traditional business process using BPM and SOA, but it also reveals several challenges, technical and organizational, of converting traditional development into service- and process-oriented development.
Steen Brahe
Matching Customer Processes with Business Processes of Banks: The Example of Small and Medium-Sized Enterprises as Bank Customers
Abstract
Even though, financial services providers claim to offer customer-orientated services, they still focus on delivering products instead of providing solutions to their customers’ issues. Especially, small and medium-sized enterprises only get offered products which solve isolated problems, e.g. liquidity, financing, and investment services. However, these services do not reflect the intrinsic requirements of business clients such as procurement, sales and marketing, order fulfillment. Hence, customers’ perception of banking services is often far from satisfaction. Therefore, the consistent alignment of financial services to customer processes becomes increasingly important to enhance competitiveness of banks. To provide such a continuous support of customer needs this paper examines the identification of customer processes and requirements and proposes a process model which closely ties up to customer processes. This approach expands current notion of banking. The authors present their approach by using an example of small and medium-sized enterprises as clients of commercial banks.
Diana Heckl, Jürgen Moormann
Workflow Management Systems + Swarm Intelligence = Dynamic Task Assignment for Emergency Management Applications
Abstract
The assignment of tasks to human performers is a critical component in people-centric business process management systems. Workflow management systems typically assign work items using strategies that only consider qualified resources. There are, however, situations, where this approach falls short. For instance, in emergency response situations, tasks need to be carried out by resources that are available immediately, even if they do not match all skill requirements. This paper compares the performance of a set of six task assignment mechanisms for workflow applications using a scenario from the emergency management domain. In particular, we develop and simulate assignment strategies inspired by stimulus/response models derived from swarm intelligence, and benchmark these strategies against conventional task assignment strategies. Our findings show that swarm intelligence-based approaches outperform the traditional assignment of tasks in ad-hoc organizations, and that workflow-based emergency management systems could benefit significantly from these novel task assignment strategies.
Hajo A. Reijers, Monique H. Jansen-Vullers, Michael zur Muehlen, Winfried Appl
Evaluating Peer-to-Peer for Loosely Coupled Business Collaboration: A Case Study
Abstract
Built-in support for self-organization, reliability, and decentralized management makes peer-to-peer an inherently suitable paradigm for loosely coupled business collaboration applications. However, current raw peer-to-peer algorithms are not sufficient to fulfill the requirements of distributed business process management. In this paper, we make the case for a generic service layer between peer-to-peer overlay and business application; we identify a number of important service layer components, and we evaluate these components with respect to requirements gathered from an industrial case study: automotive collaborative product development (CPD).
Fabian Stäber, Jörg P. Müller

Compliance and Change

Modeling Control Objectives for Business Process Compliance
Abstract
Business process design is primarily driven by process improvement objectives. However, the role of control objectives stemming from regulations and standards is becoming increasingly important for businesses in light of recent events that led to some of the largest scandals in corporate history. As organizations strive to meet compliance agendas, there is an evident need to provide systematic approaches that assist in the understanding of the interplay between (often conflicting) business and control objectives during business process design. In this paper, our objective is twofold. We will firstly present a research agenda in the space of business process compliance, identifying major technical and organizational challenges. We then tackle a part of the overall problem space, which deals with the effective modeling of control objectives and subsequently their propagation onto business process models. Control objective modeling is proposed through a specialized modal logic based on normative systems theory, and the visualization of control objectives on business process models is achieved procedurally. The proposed approach is demonstrated in the context of a purchase-to-pay scenario.
Shazia Sadiq, Guido Governatori, Kioumars Namiri
Generation of Business Process Models for Object Life Cycle Compliance
Abstract
Business process models usually capture data exchanged between tasks in terms of objects. These objects are commonly standardized using reference data models that prescribe, among other things, allowed object states. Allowed state transitions can be modeled as object life cycles that require compliance of business processes. In this paper, we first establish a notion of compliance of a business process model with an object life cycle. We then propose a technique for generating a compliant business process model from a set of given reference object life cycles.
Jochen M. Küster, Ksenia Ryndina, Harald Gall
Highly Dynamic Adaptation in Process Management Systems Through Execution Monitoring
Abstract
Nowadays, process management systems can be used not only in classical business scenarios, but also in highly mobile and dynamic situations, e.g., in supporting operators during emergency management in order to coordinate their activities. In such challenging situations, processes should be adapted, in order to cope with anomalous situations, including connection anomalies and task faults. In this paper, we present a general approach, based on execution monitoring, which is (i) practical, by relying on well-established planning techniques, and (ii) does not require the definition of the adaptation strategy in the process itself (as most of the current approaches do). We prove the correctness and completeness of the approach.
Massimiliano de Leoni, Massimo Mecella, Giuseppe De Giacomo
Version Management in the Business Process Change Context
Abstract
The current business endures a fast changing environment, which drives organisations to continuously adapt their business processes to new conditions. In this background, the workflow version control plays an important role for the change management of business processes. To better handle the versions of evolving workflow process definitions, a new versioning method is introduced in this paper. To capture the dynamics of the workflow evolvement, we propose a novel version preserving directed graph model to represent the run time evolvement of a workflow process, and devise a series of modification operations to characterise workflow updating on the fly. The extraction of workflow versions from a version preserving graph is also discussed with two different extraction strategies. Particularly, our method allows the execution of multiple workflow instances of different versions within a single graph, and supports the evolvements initiated by temporary changes.
Xiaohui Zhao, Chengfei Liu

Process Configuration and Execution

BPELlight
Abstract
In this paper we present BPELlight which decouples process logic from interface definitions. By extending BPEL 2.0 with a WSDL-less interaction model, BPELlight allows to specify process models independent of Web service technology. Since its interaction model is based on plain message exchange, it is completely independent of any interface description language. This fosters flexibility and reusability of process models and enables modelling platform and component model independent business processes. The presented approach takes a significant step towards narrowing down the gap between business level and IT level by facilitating a more business-oriented modelling of executable processes.
Jörg Nitzsche, Tammo van Lessen, Dimka Karastoyanova, Frank Leymann
An Enactment-Engine Based on Use-Cases
Abstract
We show how one can control a workflow enactment engine based on the information which is available in written use cases (as produced by requirements elicitation). We give details of how different aspects of the engine can be configured, including the process definition, workflow participant profiles, user interface, audit data, etc. These techniques have been carried out in an industrial setting, with considerable success. Our methods are applicable to engines for business process management, web service orchestration, and traditional workflow.
Avner Ottensooser, Alan Fekete
Requirements-Driven Design and Configuration Management of Business Processes
Abstract
The success of a business process (BP) depends on whether it meets its business goal as well as non-functional requirements associated with it. BP specifications frequently need to accommodate changing business priorities, varying client preferences, etc. However, since business process goals and preferences are rarely captured explicitly in the dominant BP modeling approaches, adapting business processes proves difficult. We propose a systematic requirements-driven approach for BP design and configuration management that uses requirements goal models to capture alternative process configurations and provides the ability to tailor deployed processes to changing business priorities or customer preferences (i.e., non-functional constraints) by configuring their corresponding goal models at the goal level. A set of design time and runtime tools for configuring business processes implemented using WS-BPEL is provided, allowing to easily change the behaviour of deployed BP instances at a high level, based on business priorities and stakeholder preferences.
Alexei Lapouchnian, Yijun Yu, John Mylopoulos
SAP WebFlow Made Configurable: Unifying Workflow Templates into a Configurable Model
Abstract
To facilitate the implementation of workflows, enterprise and workflow system vendors typically provide workflow templates for their software. Each of these templates depicts a variant of how the software supports a certain business process, allowing the user to save the effort of creating models and links to system components from scratch by selecting and activating the appropriate template. A combination of the strengths from different templates is however only achievable by manually adapting the templates which is cumbersome. We therefore suggest in this paper to combine different workflow templates into a single configurable workflow template. Using the workflow modeling language of SAP’s WebFlow engine, we show how such a configurable workflow modeling language can be created by identifying the configurable elements in the original language. Requirements imposed on configurations inhibit invalid configurations. Based on a default configuration such configurable templates can be used as easy as the traditional templates. The suggested approach is also applicable to other workflow modeling languages.
Florian Gottschalk, Wil M. P. van der Aalst, Monique H. Jansen-Vullers

Formal Foundations of BPM

Behavioral Constraints for Services
Abstract
In service-oriented architectures (SOA), deadlock-free interaction of services is an important correctness criterion. To support service discovery in an SOA, operating guidelines serve as a structure to characterize all deadlock-freely interacting partners of a services. In practice, however, there are intended and unintended deadlock-freely interacting partners of a service. In this paper, we provide a formal approach to express intended and unintended behavior as behavioral constraints. With such a constraint, unintended partners can be “filtered” yielding a customized operating guideline. Customized operating guidelines can be applied to validate a service and for service discovery.
Niels Lohmann, Peter Massuthe, Karsten Wolf
Towards Formal Analysis of Artifact-Centric Business Process Models
Abstract
Business process (BP) modeling is a building block for design and management of business processes. Two fundamental aspects of BP modeling are: a formal framework that well integrates both control flow and data, and a set of tools to assist all phases of a BP life cycle. This paper is an initial attempt to address both aspects of BP modeling. We view our investigation as a precursor to the development of a framework and tools that enable automated construction of processes, along the lines of techniques developed around OWL-S and Semantic Web Services.
Over the last decade, an artifact-centric approach of coupling control and data emerged in the practice of BP design. It focuses on the “moving” data as they are manipulated throughout a process. In this paper, we formulate a formal model for artifact-centric business processes and develop complexity results concerning static analysis of three problems of immediate practical concerns, which focus on the ability to complete an execution, existence of an execution “deadend”, and redundancy. We show that the problems are undecidable in general, but under various restrictions they are decidable but complete in pspace, co-np, and np; and in some cases decidable in linear time.
Kamal Bhattacharya, Cagdas Gerede, Richard Hull, Rong Liu, Jianwen Su
Local Enforceability in Interaction Petri Nets
Abstract
In scenarios where a set of independent business partners engage in complex conversations, global interaction models are a means to specify the allowed interaction behavior from a global perspective. In these models atomic interactions serve as basic building blocks and behavioral dependencies are defined between them. Global interaction models might not be locally enforceable, i.e. they specify constraints that cannot be enforced during execution without additional synchronization interactions. As this property has only been defined textually so far, this paper presents a formal definition. For doing so, this paper introduces interaction Petri nets, a Petri net extension for representing global interaction models. Algorithms for deriving the behavioral interface for each partner and for enforceability checking are provided.
Gero Decker, Mathias Weske
Modelling with History-Dependent Petri Nets
Abstract
Most information systems that are driven by process models (e.g., workflow management systems) record events in event logs, also known as transaction logs or audit trails. We consider processes that not only keep track of their history in a log, but also make decisions based on this log. Extending our previous work on history-dependent Petri nets we propose and evaluate a methodology for modelling processes by such nets and show how history-dependent nets can combine modelling comfort with analysability.
Kees van Hee, Alexander Serebrenik, Natalia Sidorova, Marc Voorhoeve, Jan Martijn van der Werf

Business Process Mining

Fuzzy Mining – Adaptive Process Simplification Based on Multi-perspective Metrics
Abstract
Process Mining is a technique for extracting process models from execution logs. This is particularly useful in situations where people have an idealized view of reality. Real-life processes turn out to be less structured than people tend to believe. Unfortunately, traditional process mining approaches have problems dealing with unstructured processes. The discovered models are often “spaghetti-like”, showing all details without distinguishing what is important and what is not. This paper proposes a new process mining approach to overcome this problem. The approach is configurable and allows for different faithfully simplified views of a particular process. To do this, the concept of a roadmap is used as a metaphor. Just like different roadmaps provide suitable abstractions of reality, process models should provide meaningful abstractions of operational processes encountered in domains ranging from healthcare and logistics to web services and public administration.
Christian W. Günther, Wil M. P. van der Aalst
Inducing Declarative Logic-Based Models from Labeled Traces
Abstract
In this work we propose an approach for the automatic discovery of logic-based models starting from a set of process execution traces. The approach is based on a modified Inductive Logic Programming algorithm, capable of learning a set of declarative rules.
The advantage of using a declarative description is twofold. First, the process is represented in an intuitive and easily readable way; second, a family of proof procedures associated to the chosen language can be used to support the monitoring and management of processes (conformance testing, properties verification and interoperability checking, in particular).
The approach consists in first learning integrity constraints expressed as logical formulas and then translating them into a declarative graphical language named DecSerFlow.
We demonstrate the viability of the approach by applying it to a real dataset from a health case process and to an artificial dataset from an e-commerce protocol.
Evelina Lamma, Paola Mello, Marco Montali, Fabrizio Riguzzi, Sergio Storari
Approaching Process Mining with Sequence Clustering: Experiments and Findings
Abstract
Sequence clustering is a technique of bioinformatics that is used to discover the properties of sequences by grouping them into clusters and assigning each sequence to one of those clusters. In business process mining, the goal is also to extract sequence behaviour from an event log but the problem is often simplified by assuming that each event is already known to belong to a given process and process instance. In this paper, we describe two experiments where this information is not available. One is based on a real-world case study of observing a software development team for three weeks. The other is based on simulation and shows that it is possible to recover the original behaviour in a fully automated way. In both experiments, sequence clustering plays a central role.
Diogo Ferreira, Marielba Zacarias, Miguel Malheiros, Pedro Ferreira
Process Mining Based on Regions of Languages
Abstract
In this paper we give an overview, how to apply region based methods for the synthesis of Petri nets from languages to process mining.
The research domain of process mining aims at constructing a process model from an event log, such that the process model can reproduce the log, and does not allow for much more behaviour than shown in the log. We here consider Petri nets to represent process models. Event logs can be interpreted as finite languages. Region based synthesis methods can be used to construct a Petri net from a language generating the minimal net behaviour including the given language. Therefore, it seems natural to apply such methods in the process mining domain. There are several different region based methods in literature yielding different Petri nets. We adapt these methods to the process mining domain and compare them concerning efficiency and usefulness of the resulting Petri net.
Robin Bergenthum, Jörg Desel, Robert Lorenz, Sebastian Mauser

Semantic Issues in BPM

Extending Representational Analysis: BPMN User and Developer Perspectives
Abstract
Over the last years, significant academic progress has been made in the area of representational analyses that use ontology as a benchmark for evaluations and comparisons of modeling techniques. This paper proposes a research model to guide representational analysis projects, which extends existing procedural models by incorporating different stakeholder perspectives. The paper demonstrates the application of this model for the purpose of analyzing the Business Process Modeling Notation (BPMN), a recent and popular candidate for a new process modeling industry standard. A brief overview of the underlying research model characterizes the different steps in such a research project, while the BPMN analysis project emphasizes the importance of validating with users the propositions obtained via the analysis and communicating those to the technique developers in order to increase the impact of evaluation research to Information Systems practice.
Jan Recker, Marta Indulska, Peter Green
Semantic Analysis of Flow Patterns in Business Process Modeling
Abstract
Control flow elements are important in process models. Such elements usually appear in graphic models as splits and joins of activity sequences. Workflow patterns reflect possible executions of different configurations of splits and joins. However, despite the importance of process flow control and workflow patterns, no way exists yet to assure that a particular set of patterns is complete and non-redundant. We use an ontologically-based model of business processes to analyze the control configurations that can exist in a process model. A process is modeled in terms of state changes of the domain in which the process occurs. The state changes are controlled by laws which model the actions allowed in the domain. This model is notation-independent and enables incorporating goals into process analysis. We use the model to suggest classification of control configurations and identify configurations that assure the enacted process can always reach its goal.
Pnina Soffer, Yair Wand, Maya Kaner
Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases
Abstract
The software community is currently paying attention to model transformation. The MDA approach is particularly orientated towards solving the problems of time, cost and quality associated with software creation. Enterprises are, moreover, aware of the importance that business processes and security have in relation to their competitive position and performance. In our previous work, we have proposed a BPMN extension which can be used to define security requirement in business process specifications. A Secure Business Process description is that of computation independent models in an MDA context. In this paper we propose a CIM to PIM transformation composed of QVT rules. Various UML use cases, which will be part of an information system, are obtained from the secure business process description.
Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
Backmatter
Metadaten
Titel
Business Process Management
herausgegeben von
Gustavo Alonso
Peter Dadam
Michael Rosemann
Copyright-Jahr
2007
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-540-75183-0
Print ISBN
978-3-540-75182-3
DOI
https://doi.org/10.1007/978-3-540-75183-0

Neuer Inhalt