SlideShare une entreprise Scribd logo
1  sur  25
Temporal Compliance Checking
CAiSE‟2013
Elham Ramezani
Dirk Fahland
Boudewijn van Dongen
Wil M.P. van der Aalst
Compliance
Report
✓
✗
✓
✗
1
Enterprises are governed by regulations
Laws & Regulations
Diagnostic
Information
2
Compliance management and BPM
Compliance checking
on log
Compliance checking and process
perspectives
3
Data Perspective
Resource Perspective
Time Perspective
Activity „A‟ must occur at time t.
Capture occurrence of activity „A‟.
Control-Flow
Compliance Checking
Temporal Compliance
Checking
Compliance
CheckerRule 3
Rule 2
Problem setting
4
Rule 1
Diagnostic
Information
CF-Rule
Event Log
Compliance
Requirement
T-Rule
Example
5
A certain antibiotic should be administered to the patient on cycles of 2-time
treatment. The administration of antibiotic can be extended for another cycle , but
there should be at least a week delay between two subsequent cycles.
A : antibiotic administration
… : other activities in the trace
7d
Sample trace:
• C-F Rule: Activity ‘A’ must occur in cycles of 2-time occurrences.
A … A … A … A … AA,1 …,1 A,2 …,3 A,9 …,10 A,14 …,15 A,15
• T-Rule: There must be 7 days delay between two subsequent cycles.
Multiple possible diagnostics
6
A,1 …,1 A,2 …,3 A,9 …,10 A,14 …,15 A,15
A … A … A A … A … A
Log
3rd. possibility:
Log
2nd. possibility:
Log
1st. possibility:
4th.
Sample trace:
A,1 …,1 A,2 …,3 A,9 …,10 A,14 …,15 A,15
A … A … A … A A … A
A,1 …,1 A,2 …,3 A,9 …,10 A,14 …,15 A,15
A A … A … A … A … A
A,1 …,1 A,2 …,3 A,9 …,10 A,14 …,15 A,15
A is missing
Enriched log +
Diagnostics
Rule 3
Rule 2
… solve by Conformance Checking
7
Rule 1
Diagnostic
Information
Event
Log
Compliance
Requirement
Petri net
Specification
Conformance
Checker
Data-Aware
Petri net
Specification
CF-Rule
T-Rule
Data-Aware
Conformance
Checker
Compliance
Checker
Enriched log +
Diagnostics
Rule 3
Rule 2
8
Rule 1
Diagnostic
Information
Event
Log
Compliance
Requirement
Petri net
Specification
Conformance
Checker
Data-Aware
Petri net
Specification
CF-Rule
T-Rule
Data-Aware
Conformance
Checker
Compliance
Checker
Control-flow alignment
9
Alignment  Diagnostic information
trace:
alignment: actual trace vs. correct trace
“move on model” = event is missing invisible
correct
Event
Log
Adriansyah et al.[3]
Conformance
Checker
A,1 A,2 A,9 A,14 A,15
2nd.alignment
3rd.
S Ist A A Icmp Ist A A Icmp Ist A A Icmp E
>> >> A,
1
A,
2
>> >> A,
9
>> >> >> A,
14
A,
15
>> >>
Enriched log +
Diagnostics
Rule 3
Rule 2
10
Rule 1
Diagnostic
Information
Event
Log
Compliance
Requirement
Petri net
Specification
Conformance
Checker
Data-Aware
Petri net
Specification
CF-Rule
T-Rule
Data-Aware
Conformance
Checker
Compliance
Checker
Log Enrichment
11
Enriching log with additional information
S Ist A,
1
A,
2
Icmp Ist A,
9
A Icmp Ist A,
14
A,
15
Icmp E
>> >> A,
1
A,
2
>> >> A,
9
>> >> >> A,
14
A,
15
>> >>
S,
1
Ist,
1
A,
1
A,
2
Icmp,
2
Ist,
9
A,
9
A
9
Icmp,
9
Ist,
14
A,
14
A,
15
Icmp,
15
E,
15
Enriched log from
2nd.alignment
3rd. 9
Enriched log +
Diagnostics
Rule 3
Rule 2
12
Rule 1
Diagnostic
Information
Event
Log
Compliance
Requirement
Petri net
Specification
Conformance
Checker
Data-Aware
Petri net
Specification
CF-Rule
T-Rule
Data-Aware
Conformance
Checker
Compliance
Checker
Temporal rule formalization
13
Between two cycles of occurrences of ‘A’ there must be one week delay
…
EFinal
Initial
…
Ist
Icmp
A
S
[tst` = tcmp+ 7d] ∨ tcmp = undef.
Formalizing temporal rule in terms of
data-aware Petri net
S,
1
Ist,
1
A,
1
A,
2
Icmp,
2
Ist,
9
A,
9
A
9
Icmp,
9
Ist,
14
A,
14
A,
15
Icmp,
15
E,
15
Enriched log:
W: { t st }
W: { t cmp }
t st =1 t A =1 t A =2 t cmp =2t st =9 t A =9
✓
t A =9t cmp =9 t st =14
✗
t A =14t A =15t cmp =15t S=1 t E =15
Enriched log +
Diagnostics
Rule 3
Rule 2
14
Rule 1
Diagnostic
Information
Event
Log
Compliance
Requirement
Petri net
Specification
Conformance
Checker
Data-Aware
Petri net
Specification
CF-Rule
T-Rule
Data-Aware
Conformance
Checker
Compliance
Checker
Temporal compliance checking
PAGE 15
Data-aware alignment
Data-Aware
Conformance Checker
M.de Leoni et al. [13]
S,
1
Ist,
1
A,
1
A,
2
Icmp,
2
Ist,
9
A,
9
A,
9
Icmp,
9
Ist,
16
A,
14
A,
15
Icmp,
15
E,
15
S,
1
Ist,
1
A,
1
A,
2
Icmp,
2
Ist,
9
A,
9
A,
9
Icmp,
9
Ist,
14
A,
14
A,
15
Icmp,
15
E,
15
✗
L: 14, M: 16
✓✓
PAGE 16
Diagnostics
Data-Aware
Conformance Checker
Conformance Checker
S,
1
Ist,
1
A,
1
A,
2
Icmp,
2
Ist,
9
A,
9
A,
9
Icmp,
9
Ist,
16
A,
14
A,
15
Icmp,
15
E,
15
S,
1
Ist,
1
A,
1
A,
2
Icmp,
2
Ist,
9
A,
9
A,
9
Icmp,
9
Ist,
14
A,
14
A,
15
Icmp,
15
E,
15
Combined
Diagnostic Information
PAGE 17
Implementation
ProM6 (www.promtools.org/prom6)
Check Temporal Compliance Using Data-Aware Conformance Checking
18
Case study in Dutch municipalities
Compliance Constraint:
Applications must be processed within 8 weeks, excluding the time they
are waiting for additional required information provided by applicant.
# Cases
Violations
# Avg. Delay
(months)
Max. Delay
(months)
1364 233 3.5 15
19
Cases vs. handover of work
0
10
20
30
40
50
60
70
0 10 20 30 40 50 60 70
# cases
# handovers
20
Violations vs. handover of work
# handovers
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
25 30 35 40 45 50 55 60 65 70
% violated
% violated
Enriched log +
Diagnostics
Rule 3
Rule 2
21
Rule 1
Diagnostic
Information
Event
Log
Compliance
Requirement
Petri net
Specification
Conformance
Checker
Data-Aware
Petri net
Specification
CF-Rule
T-Rule
Data-Aware
Conformance
Checker
Compliance
Checker
Take home points
22
Questions?
Enriched log +
Diagnostics
Rule 3
Rule 2
23
Rule 1
Diagnostic
Information
Event
Log
Compliance
Requirement
Petri net
Specification
Conformance
Checker
Data-Aware
Petri net
Specification
CF-Rule
T-Rule
Data-Aware
Conformance
Checker
Compliance
Checker
Rule repositories
Repository
Generic CF-Rules
& Formalization
Repository
Generic T-Rules &
Formalization
CF-Rule
T-Rule
Overview
24
Thank you for your
attention!

Contenu connexe

Similaire à Ramezani taghiabadi temporal compliance checking 2

Webinar: How to Develop a Regulatory-compliant Continued Process Verificatio...
Webinar: 	How to Develop a Regulatory-compliant Continued Process Verificatio...Webinar: 	How to Develop a Regulatory-compliant Continued Process Verificatio...
Webinar: How to Develop a Regulatory-compliant Continued Process Verificatio...MilliporeSigma
 
Webinar: How to Develop a Regulatory-compliant Continued Process Verification...
Webinar: How to Develop a Regulatory-compliant Continued Process Verification...Webinar: How to Develop a Regulatory-compliant Continued Process Verification...
Webinar: How to Develop a Regulatory-compliant Continued Process Verification...Merck Life Sciences
 
3.J Pharma monitoring of HVAC systems.docx
3.J Pharma monitoring of HVAC systems.docx3.J Pharma monitoring of HVAC systems.docx
3.J Pharma monitoring of HVAC systems.docxSamehMostafa33
 
Risk Based Approach CSV Training_Katalyst HLS
Risk Based Approach CSV Training_Katalyst HLSRisk Based Approach CSV Training_Katalyst HLS
Risk Based Approach CSV Training_Katalyst HLSKatalyst HLS
 
Quality assurance of treatment planning system by Rahim Gohar
Quality assurance of treatment planning system by Rahim GoharQuality assurance of treatment planning system by Rahim Gohar
Quality assurance of treatment planning system by Rahim GoharRahim Gohar
 
IoT Device Intelligence & Real Time Anomaly Detection
IoT Device Intelligence & Real Time Anomaly DetectionIoT Device Intelligence & Real Time Anomaly Detection
IoT Device Intelligence & Real Time Anomaly DetectionBraja Krishna Das
 
Decision support
Decision supportDecision support
Decision supportJoms Antony
 
Presentation for Phi Sigma Fall 2015
Presentation for Phi Sigma Fall 2015Presentation for Phi Sigma Fall 2015
Presentation for Phi Sigma Fall 2015Caelie Kern
 
Cem com example-qa_qc_plan
Cem com example-qa_qc_planCem com example-qa_qc_plan
Cem com example-qa_qc_planEWAY1
 
ISA FPID Presentation Final 3
ISA FPID Presentation Final 3ISA FPID Presentation Final 3
ISA FPID Presentation Final 3Paul Brodbeck
 
The Joint Commission Fluoroscopy Requirements 2019
The Joint Commission Fluoroscopy Requirements 2019The Joint Commission Fluoroscopy Requirements 2019
The Joint Commission Fluoroscopy Requirements 2019Marcella Lobo
 

Similaire à Ramezani taghiabadi temporal compliance checking 2 (13)

Webinar: How to Develop a Regulatory-compliant Continued Process Verificatio...
Webinar: 	How to Develop a Regulatory-compliant Continued Process Verificatio...Webinar: 	How to Develop a Regulatory-compliant Continued Process Verificatio...
Webinar: How to Develop a Regulatory-compliant Continued Process Verificatio...
 
Webinar: How to Develop a Regulatory-compliant Continued Process Verification...
Webinar: How to Develop a Regulatory-compliant Continued Process Verification...Webinar: How to Develop a Regulatory-compliant Continued Process Verification...
Webinar: How to Develop a Regulatory-compliant Continued Process Verification...
 
Lp2007 216
Lp2007 216Lp2007 216
Lp2007 216
 
3.J Pharma monitoring of HVAC systems.docx
3.J Pharma monitoring of HVAC systems.docx3.J Pharma monitoring of HVAC systems.docx
3.J Pharma monitoring of HVAC systems.docx
 
Risk Based Approach CSV Training_Katalyst HLS
Risk Based Approach CSV Training_Katalyst HLSRisk Based Approach CSV Training_Katalyst HLS
Risk Based Approach CSV Training_Katalyst HLS
 
Quality assurance of treatment planning system by Rahim Gohar
Quality assurance of treatment planning system by Rahim GoharQuality assurance of treatment planning system by Rahim Gohar
Quality assurance of treatment planning system by Rahim Gohar
 
IoT Device Intelligence & Real Time Anomaly Detection
IoT Device Intelligence & Real Time Anomaly DetectionIoT Device Intelligence & Real Time Anomaly Detection
IoT Device Intelligence & Real Time Anomaly Detection
 
Decision support
Decision supportDecision support
Decision support
 
Presentation for Phi Sigma Fall 2015
Presentation for Phi Sigma Fall 2015Presentation for Phi Sigma Fall 2015
Presentation for Phi Sigma Fall 2015
 
Cem com example-qa_qc_plan
Cem com example-qa_qc_planCem com example-qa_qc_plan
Cem com example-qa_qc_plan
 
ISA FPID Presentation Final 3
ISA FPID Presentation Final 3ISA FPID Presentation Final 3
ISA FPID Presentation Final 3
 
The Joint Commission Fluoroscopy Requirements 2019
The Joint Commission Fluoroscopy Requirements 2019The Joint Commission Fluoroscopy Requirements 2019
The Joint Commission Fluoroscopy Requirements 2019
 
16. SPC.pptx
16. SPC.pptx16. SPC.pptx
16. SPC.pptx
 

Plus de caise2013vlc

Markus keuneke partial data-models
Markus keuneke   partial data-modelsMarkus keuneke   partial data-models
Markus keuneke partial data-modelscaise2013vlc
 
Jelena zdravkovic c ai-se 2013 capability caas
Jelena zdravkovic  c ai-se 2013 capability caasJelena zdravkovic  c ai-se 2013 capability caas
Jelena zdravkovic c ai-se 2013 capability caascaise2013vlc
 
Sagar sen caise2013final
Sagar sen caise2013finalSagar sen caise2013final
Sagar sen caise2013finalcaise2013vlc
 
David aguilera presentation
David aguilera   presentationDavid aguilera   presentation
David aguilera presentationcaise2013vlc
 
Sonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalSonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalcaise2013vlc
 
Suriadi caise2013 slides
Suriadi caise2013 slidesSuriadi caise2013 slides
Suriadi caise2013 slidescaise2013vlc
 
Fadila caise2013 vf
Fadila caise2013 vfFadila caise2013 vf
Fadila caise2013 vfcaise2013vlc
 
Michael mrissa c aise
Michael mrissa c aiseMichael mrissa c aise
Michael mrissa c aisecaise2013vlc
 
Razvan petrusel presentation caise 2013
Razvan petrusel   presentation caise 2013Razvan petrusel   presentation caise 2013
Razvan petrusel presentation caise 2013caise2013vlc
 
Ferreira c ai-se2013-final-handouts
Ferreira   c ai-se2013-final-handoutsFerreira   c ai-se2013-final-handouts
Ferreira c ai-se2013-final-handoutscaise2013vlc
 
Sonja meyer caise 2013
Sonja meyer caise 2013Sonja meyer caise 2013
Sonja meyer caise 2013caise2013vlc
 
Tony clark caise 13-presentation
Tony clark  caise 13-presentationTony clark  caise 13-presentation
Tony clark caise 13-presentationcaise2013vlc
 
Miguel goulao 2013 c-aise
Miguel goulao 2013 c-aiseMiguel goulao 2013 c-aise
Miguel goulao 2013 c-aisecaise2013vlc
 
Jorge cardoso caise-usdl-tosca-2013-06-18c
Jorge cardoso   caise-usdl-tosca-2013-06-18cJorge cardoso   caise-usdl-tosca-2013-06-18c
Jorge cardoso caise-usdl-tosca-2013-06-18ccaise2013vlc
 
Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_caise2013vlc
 
Peter sawyer caise
Peter sawyer  caisePeter sawyer  caise
Peter sawyer caisecaise2013vlc
 
Malinda scalability c_ai_se_2013_v3
Malinda scalability c_ai_se_2013_v3Malinda scalability c_ai_se_2013_v3
Malinda scalability c_ai_se_2013_v3caise2013vlc
 
Maurino andrea coopetitivecaise2013
Maurino andrea   coopetitivecaise2013Maurino andrea   coopetitivecaise2013
Maurino andrea coopetitivecaise2013caise2013vlc
 

Plus de caise2013vlc (20)

Caise panel
Caise panelCaise panel
Caise panel
 
Markus keuneke partial data-models
Markus keuneke   partial data-modelsMarkus keuneke   partial data-models
Markus keuneke partial data-models
 
Jelena zdravkovic c ai-se 2013 capability caas
Jelena zdravkovic  c ai-se 2013 capability caasJelena zdravkovic  c ai-se 2013 capability caas
Jelena zdravkovic c ai-se 2013 capability caas
 
Sagar sen caise2013final
Sagar sen caise2013finalSagar sen caise2013final
Sagar sen caise2013final
 
David aguilera presentation
David aguilera   presentationDavid aguilera   presentation
David aguilera presentation
 
Sonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalSonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_final
 
Suriadi caise2013 slides
Suriadi caise2013 slidesSuriadi caise2013 slides
Suriadi caise2013 slides
 
Fadila caise2013 vf
Fadila caise2013 vfFadila caise2013 vf
Fadila caise2013 vf
 
Michael mrissa c aise
Michael mrissa c aiseMichael mrissa c aise
Michael mrissa c aise
 
Razvan petrusel presentation caise 2013
Razvan petrusel   presentation caise 2013Razvan petrusel   presentation caise 2013
Razvan petrusel presentation caise 2013
 
Ferreira c ai-se2013-final-handouts
Ferreira   c ai-se2013-final-handoutsFerreira   c ai-se2013-final-handouts
Ferreira c ai-se2013-final-handouts
 
Sonja meyer caise 2013
Sonja meyer caise 2013Sonja meyer caise 2013
Sonja meyer caise 2013
 
Tony clark caise 13-presentation
Tony clark  caise 13-presentationTony clark  caise 13-presentation
Tony clark caise 13-presentation
 
Miguel goulao 2013 c-aise
Miguel goulao 2013 c-aiseMiguel goulao 2013 c-aise
Miguel goulao 2013 c-aise
 
Jorge cardoso caise-usdl-tosca-2013-06-18c
Jorge cardoso   caise-usdl-tosca-2013-06-18cJorge cardoso   caise-usdl-tosca-2013-06-18c
Jorge cardoso caise-usdl-tosca-2013-06-18c
 
Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_
 
Peter sawyer caise
Peter sawyer  caisePeter sawyer  caise
Peter sawyer caise
 
Scekic caise13-
Scekic caise13-Scekic caise13-
Scekic caise13-
 
Malinda scalability c_ai_se_2013_v3
Malinda scalability c_ai_se_2013_v3Malinda scalability c_ai_se_2013_v3
Malinda scalability c_ai_se_2013_v3
 
Maurino andrea coopetitivecaise2013
Maurino andrea   coopetitivecaise2013Maurino andrea   coopetitivecaise2013
Maurino andrea coopetitivecaise2013
 

Dernier

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Ramezani taghiabadi temporal compliance checking 2

  • 1. Temporal Compliance Checking CAiSE‟2013 Elham Ramezani Dirk Fahland Boudewijn van Dongen Wil M.P. van der Aalst
  • 2. Compliance Report ✓ ✗ ✓ ✗ 1 Enterprises are governed by regulations Laws & Regulations Diagnostic Information
  • 3. 2 Compliance management and BPM Compliance checking on log
  • 4. Compliance checking and process perspectives 3 Data Perspective Resource Perspective Time Perspective Activity „A‟ must occur at time t. Capture occurrence of activity „A‟. Control-Flow Compliance Checking Temporal Compliance Checking
  • 5. Compliance CheckerRule 3 Rule 2 Problem setting 4 Rule 1 Diagnostic Information CF-Rule Event Log Compliance Requirement T-Rule
  • 6. Example 5 A certain antibiotic should be administered to the patient on cycles of 2-time treatment. The administration of antibiotic can be extended for another cycle , but there should be at least a week delay between two subsequent cycles. A : antibiotic administration … : other activities in the trace 7d Sample trace: • C-F Rule: Activity ‘A’ must occur in cycles of 2-time occurrences. A … A … A … A … AA,1 …,1 A,2 …,3 A,9 …,10 A,14 …,15 A,15 • T-Rule: There must be 7 days delay between two subsequent cycles.
  • 7. Multiple possible diagnostics 6 A,1 …,1 A,2 …,3 A,9 …,10 A,14 …,15 A,15 A … A … A A … A … A Log 3rd. possibility: Log 2nd. possibility: Log 1st. possibility: 4th. Sample trace: A,1 …,1 A,2 …,3 A,9 …,10 A,14 …,15 A,15 A … A … A … A A … A A,1 …,1 A,2 …,3 A,9 …,10 A,14 …,15 A,15 A A … A … A … A … A A,1 …,1 A,2 …,3 A,9 …,10 A,14 …,15 A,15 A is missing
  • 8. Enriched log + Diagnostics Rule 3 Rule 2 … solve by Conformance Checking 7 Rule 1 Diagnostic Information Event Log Compliance Requirement Petri net Specification Conformance Checker Data-Aware Petri net Specification CF-Rule T-Rule Data-Aware Conformance Checker Compliance Checker
  • 9. Enriched log + Diagnostics Rule 3 Rule 2 8 Rule 1 Diagnostic Information Event Log Compliance Requirement Petri net Specification Conformance Checker Data-Aware Petri net Specification CF-Rule T-Rule Data-Aware Conformance Checker Compliance Checker Control-flow alignment
  • 10. 9 Alignment  Diagnostic information trace: alignment: actual trace vs. correct trace “move on model” = event is missing invisible correct Event Log Adriansyah et al.[3] Conformance Checker A,1 A,2 A,9 A,14 A,15 2nd.alignment 3rd. S Ist A A Icmp Ist A A Icmp Ist A A Icmp E >> >> A, 1 A, 2 >> >> A, 9 >> >> >> A, 14 A, 15 >> >>
  • 11. Enriched log + Diagnostics Rule 3 Rule 2 10 Rule 1 Diagnostic Information Event Log Compliance Requirement Petri net Specification Conformance Checker Data-Aware Petri net Specification CF-Rule T-Rule Data-Aware Conformance Checker Compliance Checker Log Enrichment
  • 12. 11 Enriching log with additional information S Ist A, 1 A, 2 Icmp Ist A, 9 A Icmp Ist A, 14 A, 15 Icmp E >> >> A, 1 A, 2 >> >> A, 9 >> >> >> A, 14 A, 15 >> >> S, 1 Ist, 1 A, 1 A, 2 Icmp, 2 Ist, 9 A, 9 A 9 Icmp, 9 Ist, 14 A, 14 A, 15 Icmp, 15 E, 15 Enriched log from 2nd.alignment 3rd. 9
  • 13. Enriched log + Diagnostics Rule 3 Rule 2 12 Rule 1 Diagnostic Information Event Log Compliance Requirement Petri net Specification Conformance Checker Data-Aware Petri net Specification CF-Rule T-Rule Data-Aware Conformance Checker Compliance Checker Temporal rule formalization
  • 14. 13 Between two cycles of occurrences of ‘A’ there must be one week delay … EFinal Initial … Ist Icmp A S [tst` = tcmp+ 7d] ∨ tcmp = undef. Formalizing temporal rule in terms of data-aware Petri net S, 1 Ist, 1 A, 1 A, 2 Icmp, 2 Ist, 9 A, 9 A 9 Icmp, 9 Ist, 14 A, 14 A, 15 Icmp, 15 E, 15 Enriched log: W: { t st } W: { t cmp } t st =1 t A =1 t A =2 t cmp =2t st =9 t A =9 ✓ t A =9t cmp =9 t st =14 ✗ t A =14t A =15t cmp =15t S=1 t E =15
  • 15. Enriched log + Diagnostics Rule 3 Rule 2 14 Rule 1 Diagnostic Information Event Log Compliance Requirement Petri net Specification Conformance Checker Data-Aware Petri net Specification CF-Rule T-Rule Data-Aware Conformance Checker Compliance Checker Temporal compliance checking
  • 16. PAGE 15 Data-aware alignment Data-Aware Conformance Checker M.de Leoni et al. [13] S, 1 Ist, 1 A, 1 A, 2 Icmp, 2 Ist, 9 A, 9 A, 9 Icmp, 9 Ist, 16 A, 14 A, 15 Icmp, 15 E, 15 S, 1 Ist, 1 A, 1 A, 2 Icmp, 2 Ist, 9 A, 9 A, 9 Icmp, 9 Ist, 14 A, 14 A, 15 Icmp, 15 E, 15 ✗ L: 14, M: 16 ✓✓
  • 17. PAGE 16 Diagnostics Data-Aware Conformance Checker Conformance Checker S, 1 Ist, 1 A, 1 A, 2 Icmp, 2 Ist, 9 A, 9 A, 9 Icmp, 9 Ist, 16 A, 14 A, 15 Icmp, 15 E, 15 S, 1 Ist, 1 A, 1 A, 2 Icmp, 2 Ist, 9 A, 9 A, 9 Icmp, 9 Ist, 14 A, 14 A, 15 Icmp, 15 E, 15 Combined Diagnostic Information
  • 18. PAGE 17 Implementation ProM6 (www.promtools.org/prom6) Check Temporal Compliance Using Data-Aware Conformance Checking
  • 19. 18 Case study in Dutch municipalities Compliance Constraint: Applications must be processed within 8 weeks, excluding the time they are waiting for additional required information provided by applicant. # Cases Violations # Avg. Delay (months) Max. Delay (months) 1364 233 3.5 15
  • 20. 19 Cases vs. handover of work 0 10 20 30 40 50 60 70 0 10 20 30 40 50 60 70 # cases # handovers
  • 21. 20 Violations vs. handover of work # handovers 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 25 30 35 40 45 50 55 60 65 70 % violated % violated
  • 22. Enriched log + Diagnostics Rule 3 Rule 2 21 Rule 1 Diagnostic Information Event Log Compliance Requirement Petri net Specification Conformance Checker Data-Aware Petri net Specification CF-Rule T-Rule Data-Aware Conformance Checker Compliance Checker Take home points
  • 24. Enriched log + Diagnostics Rule 3 Rule 2 23 Rule 1 Diagnostic Information Event Log Compliance Requirement Petri net Specification Conformance Checker Data-Aware Petri net Specification CF-Rule T-Rule Data-Aware Conformance Checker Compliance Checker Rule repositories Repository Generic CF-Rules & Formalization Repository Generic T-Rules & Formalization CF-Rule T-Rule Overview
  • 25. 24 Thank you for your attention!

Notes de l'éditeur

  1. Where exactly sth is missing and when did it go wrong?