Compliance Checking of Shipment Request by Utilizing Process Mining Concepts: An Evaluation of Smart Auditing Framework

Faiza Allah Bukhsh Bukhsh, Hans Weigand Weigand

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
    1 Downloads (Pure)

    Abstract

    Risk regulations and compliance management require business controls automation. Business processes execution yield event logs and analysis of these logs can produce valuable knowledge for organizational product and/or service improvements. In this paper we have explored a monitoring scenario of shipment request and evaluated it on the basis of Smart auditing framework. A combination of process mining techniques and business process ontologies is evaluated on simulated data in order to identify the auditing/monitoring capability of PROM plug-in's. The initial evaluation revealed that rule based audit is successful on machine-crafted data in PROM tool. Moreover, this paper also highlights lack of automated rule translation in LTL-checker (PROM plug-in) for smart audit frameworks evaluations.

    Original languageEnglish
    Title of host publication2017 International Conference on Frontiers of Information Technology (FIT)
    PublisherIEEE
    Pages235-240
    Number of pages6
    ISBN (Electronic)9781538635674
    DOIs
    Publication statusPublished - 16 Jan 2018
    Event15th International Conference on Frontiers of Information Technology, FIT 2017 - Islamabad, Pakistan
    Duration: 18 Dec 201720 Dec 2017
    Conference number: 15

    Conference

    Conference15th International Conference on Frontiers of Information Technology, FIT 2017
    Abbreviated titleFIT
    CountryPakistan
    CityIslamabad
    Period18/12/1720/12/17

    Keywords

    • Compliance checking
    • information auditing
    • process mining

    Fingerprint Dive into the research topics of 'Compliance Checking of Shipment Request by Utilizing Process Mining Concepts: An Evaluation of Smart Auditing Framework'. Together they form a unique fingerprint.

    Cite this