2011
DOI: 10.1016/j.eswa.2011.04.159
|View full text |Cite
|
Sign up to set email alerts
|

A business process mining application for internal transaction fraud mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
92
0
6

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 149 publications
(104 citation statements)
references
References 14 publications
0
92
0
6
Order By: Relevance
“…This discipline emerged in the context of business processes, but it has expanded to multiple areas as reported in Mans et al (2008), Poggi et al (2013), van der Aalst et al (2007), Jans et al (2011). However, the application of this set of techniques to the context of robot missions is still unexplored although it looks really promising.…”
Section: Process Miningmentioning
confidence: 99%
See 1 more Smart Citation
“…This discipline emerged in the context of business processes, but it has expanded to multiple areas as reported in Mans et al (2008), Poggi et al (2013), van der Aalst et al (2007), Jans et al (2011). However, the application of this set of techniques to the context of robot missions is still unexplored although it looks really promising.…”
Section: Process Miningmentioning
confidence: 99%
“…This discipline has been successfully applied to industries, organizations and public services. Some cases of use are the management of healthcare processes in hospitals (Mans et al 2008), the analysis of customer behavior in web commerce (Poggi et al 2013), the management of government offices (van der Aalst et al 2007), and the detection of transaction fraud at early stages (Jans et al 2011). Nevertheless, process mining is not extensively used in robotics, despite its potential in multi-robot missions.…”
Section: Introductionmentioning
confidence: 99%
“…Few approaches exist that aim to identify and/or assess process risks [7,8,21]. Wickboldt et al proposed a framework that uses process execution data for risk assessment [21].…”
Section: Related and Previous Workmentioning
confidence: 99%
“…Our approach avoids subjective opinions and learns such values from historic event data. Jans et al [8] proposed using process mining for the identification of one particular type of risk (transactional fraud risk) and showed that available process mining tools can help auditors detect fraud. By contrast, our approach focuses on quantifiable values such as delays or product quality and it emphasises automatable techniques for risk identification that can be used for run-time operational support [16].…”
Section: Related and Previous Workmentioning
confidence: 99%
“…As such, this form of auditing can provide more assurance. However in order to automate the process of auditing [4,7,16], it first requires the formalization of the boundaries in terms of the execution data, and secondly, it can only use context data if an automated link is provided from the execution data to the context data. As the boundaries are typically formalized in terms of the context data, and as the automated link from execution data to context data is typically not available, continuous auditing is restricted in its use.…”
Section: Introductionmentioning
confidence: 99%