{"title":"过程感知系统中的欺诈检测","authors":"F. Bezerra, Jacques Wainer","doi":"10.1504/IJBPIM.2011.040204","DOIUrl":null,"url":null,"abstract":"In the last years, some large companies have been involved in scandals related to accounting and financial mismanagement, which represented a large financial damage to their stockholders. To recover the stock market confidence, certifications and manuals for best practices of governance were developed, and in some cases, harder federal laws were implemented (eg.: Sarbox, in USA). Companies adhered to these changes as a response to the market, deploying process aware information systems (PAS) and adopting the best practices of governance. On the other hand, companies demand a rapid response to strategic changes, so the adoption of normative PAS may compromise their competitiveness. That is, the companies need flexible PAS for competitiveness reasons; whereas, flexibility may compromise the security of the system because the users can execute tasks that characterize a fraudulent execution. In order to re-balance the trade-off between security and flexibility, we present in this work an anomaly detection algorithm for logs of PAS. We believe that the identification of anomalous events can help the adoption of flexible PAS without the loss of security properties.","PeriodicalId":35372,"journal":{"name":"International Journal of Business Process Integration and Management","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"Fraud detection in process aware systems\",\"authors\":\"F. Bezerra, Jacques Wainer\",\"doi\":\"10.1504/IJBPIM.2011.040204\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the last years, some large companies have been involved in scandals related to accounting and financial mismanagement, which represented a large financial damage to their stockholders. To recover the stock market confidence, certifications and manuals for best practices of governance were developed, and in some cases, harder federal laws were implemented (eg.: Sarbox, in USA). Companies adhered to these changes as a response to the market, deploying process aware information systems (PAS) and adopting the best practices of governance. On the other hand, companies demand a rapid response to strategic changes, so the adoption of normative PAS may compromise their competitiveness. That is, the companies need flexible PAS for competitiveness reasons; whereas, flexibility may compromise the security of the system because the users can execute tasks that characterize a fraudulent execution. In order to re-balance the trade-off between security and flexibility, we present in this work an anomaly detection algorithm for logs of PAS. We believe that the identification of anomalous events can help the adoption of flexible PAS without the loss of security properties.\",\"PeriodicalId\":35372,\"journal\":{\"name\":\"International Journal of Business Process Integration and Management\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Business Process Integration and Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJBPIM.2011.040204\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Business, Management and Accounting\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Business Process Integration and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJBPIM.2011.040204","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Business, Management and Accounting","Score":null,"Total":0}
In the last years, some large companies have been involved in scandals related to accounting and financial mismanagement, which represented a large financial damage to their stockholders. To recover the stock market confidence, certifications and manuals for best practices of governance were developed, and in some cases, harder federal laws were implemented (eg.: Sarbox, in USA). Companies adhered to these changes as a response to the market, deploying process aware information systems (PAS) and adopting the best practices of governance. On the other hand, companies demand a rapid response to strategic changes, so the adoption of normative PAS may compromise their competitiveness. That is, the companies need flexible PAS for competitiveness reasons; whereas, flexibility may compromise the security of the system because the users can execute tasks that characterize a fraudulent execution. In order to re-balance the trade-off between security and flexibility, we present in this work an anomaly detection algorithm for logs of PAS. We believe that the identification of anomalous events can help the adoption of flexible PAS without the loss of security properties.
期刊介绍:
Business processes have played an important role in enabling business application integration and collaboration across multiple organisations. The integration can be categorised into two types: internal integration and external integration. Internal integration includes all the integration aspects within one enterprise. Enterprise application integration (EAI) is a typical example of internal integration. External integration covers all the possible integration patterns across multiple enterprises. The typical business process based external application integration includes business process to application integration (BP2Ai) and business process to business process integration (BP2BPi).