Detecting, assessing, and mitigating data inaccuracy-related risks in business processes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Business process activities and their outcomes rely on data that is commonly stored in databases. If the stored data is not accurate, namely, it does not reflect the relevant real world values, the process execution might be disrupted and the process might not be able to reach its goal. Detection of such cases and analysis of their causes may help redesign processes to reduce the potential risks. In this research, we aim to develop a semi-automated method that will enable detection, assessment, and mitigation of risks related to data inaccuracy in business processes. The method will be built on and evaluated with real cases from the industry.

Original languageEnglish
Title of host publicationBusiness Process Management Workshops BPM 2014 International Workshops, Revised Papers
EditorsFabiana Fournier, Jan Mendling
PublisherSpringer Verlag
Pages557-560
Number of pages4
ISBN (Electronic)9783319158945
DOIs
StatePublished - 2015
EventInternational Workshops on Business Process Management Workshops, BPM 2014 - Eindhoven, Netherlands
Duration: 7 Sep 20148 Sep 2014

Publication series

NameLecture Notes in Business Information Processing
Volume202
ISSN (Print)1865-1348

Conference

ConferenceInternational Workshops on Business Process Management Workshops, BPM 2014
Country/TerritoryNetherlands
CityEindhoven
Period7/09/148/09/14

Bibliographical note

Publisher Copyright:
© Springer International Publishing Switzerland 2015.

Keywords

  • Business processes
  • Data inaccuracy
  • Process design
  • Process mining
  • Risk assessment

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Management Information Systems
  • Business and International Management
  • Information Systems
  • Modeling and Simulation
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Detecting, assessing, and mitigating data inaccuracy-related risks in business processes'. Together they form a unique fingerprint.

Cite this