| 研究生: |
于涵 Yu, Han |
|---|---|
| 論文名稱: |
利用流程探勘進行企業流程的一致性檢查 Using Process Mining to Conduct Conformance Checking of Business Processes |
| 指導教授: |
徐立群
Shu, Lih-Chyun |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 會計學系 Department of Accountancy |
| 論文出版年: | 2011 |
| 畢業學年度: | 99 |
| 語文別: | 中文 |
| 論文頁數: | 48 |
| 中文關鍵詞: | 流程探勘 、一致性測試 、企業流程 |
| 外文關鍵詞: | process mining, conformance checking, business process |
| 相關次數: | 點閱:102 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
安隆(Enron)、世界通訊(Worldcom)和博達等企業財務醜聞事件後,引發國內外對公司治理和內部控制的重視。公司內部自行檢查和會計師的審查,可對企業的內部控制提供合理之確信。然而,目前以抽樣的方式評估各項控制作業設計和執行之有效性,樣本的代表性可能會受到查核人員的經驗影響。流程探勘技術利用資訊系統的事件日誌分析企業流程,可以完整的檢視企業流程,實際的流程與預期的模型不一致,表示可能有舞弊、錯誤的風險,亦顯示可能存有內部控制的缺失。相較於抽樣的方式,能更有效的進行內部控制的審查。過去學者提出利用流程探勘技術衡量一致性的方法並不能有效視檢企業流程的一致性。本論文提出兩個新的公式:(1) accuracy:利用模型和日誌的排序關係比較precision,較過去的方法能更準確的評估precision。(2) consistency:進一步考慮流程的內含資訊,評估決策點的執行是否依照決策準則執行。此二種公式可以增進流程探勘技術衡量企業流程一致性的效率和效果,不僅可用於審查企業之內部控制,亦可用以改善企業流程。
Enron, Worldcom, Procomp, and other accounting scandals triggered authorities to emphasis corporate governance and internal control to expect to decrease the risks. Corporations’ self-assessment and CPA audit could confirm the business processes match the expected specification. Auditors use sampling to assess the effectiveness of the design and operation of control activities. However, representativeness of the sample may be affected by the experience of auditors. The process mining technology using event logs from information systems to explore overall business processes. If the log traces is inconsistent with the expected model may means the fraud, the risk of errors, or the lack of internal controls. But past scholars using process mining technology to measure conformance checking could not reflect the conformance of business process effective. This paper presents two new formulas: (1) accuracy: using the ordering relation of the models and logs to compare precision, and is more effective than the past methods. (2) consistency: further consider the information in the event logs to measure if the processes conform the decision rules. These two formulas can enhance the efficiency and effectiveness of the conformance checking of the process mining. They could not only be used for internal control of the business, but also improve business processes.
外文部分
W. M. P. van der Aalst. (1996). Petri-net-based Workflow Management Software.
W. M. P. van der Aalst. (1997). Verification of Workflow Nets. Lecture Notes in Computer Science(1248), pp. 407-426.
W. M. P. van der Aalst. (1998). Three Good Reasons for Using a Petri-net-based Workflow Management System.
W. M. P. van der Aalst. (2000). Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques. Lecture Notes in Cumputer Science, pp. 161-183.
W. M. P. van der Aalst. (2010). Process discovery: capturing the invisible. IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 28-41.
W. M. P. van der Aalst. (2011). Process Mining. Springer Berlin Heidelberg.
W. M. P. van der Aalst and A. K. A. de Medeiros. (2005). Process mining and security: detecting anomalous process executions and checking process conformance. Electronic Notes in Theoretical Computer Science, 121, pp. 3-21.
W. M. P. van der Aalst, H .A. Reijersa, A.J.M.M. Weijters, B.F. van Dongen, A.K. Alves de Medeiros, M. Song, and H.M.W. Verbeek. (2007). Business process mining: An industrial application. Information Systems, pp. 713-732.
W. M. P. van der Aalst, Kees M. van Hee, Jan Martijn van der Werf, and Marc Verdonk. (2010). Auditing 2.0: using process mining to support tomorrow's auditor. Computer, 90-93.
W. M. P. van der Aalst, V. Rubin, H. M.W. Verbeek, B. F. van Dongen, E. Kindler, and C. W. Günther. (2010). Process mining: a two-step approach to balance between underfitting and overfitting. Software and Systems Modeling(9), pp. 87–111.
Rakesh Agrawal, Dimitrios Gunopulos, and Frank Leymann. (1998). Mining process models from workflow logs. Proceedings of the 6th International Conference on Extending Database Technology Valencia, pp. 469-483.
Stijn Goedertier, Jochen De Weerdt, David Martens, Jan Vanthienen, and Bart Baesens. (2011). Process discovery in event logs: An application in the telecom industry. Applied Soft Computing, 11, pp. 1697-1710.
Jonathan E. Cook and Alexander L. Wolf. (1998). Discovering models of software processes from event-based data. ACM Transactions on Software Engineering and Methodology, 7(3), pp. 215-249.
B. F. van Dongen, A. K. Alves de Medeiros, and L. Wen. (2009). Process mining: overview and outlook of petri net discovery algorithms. Lecture Notes in Computer Science(5460), pp. 225-242.
Volker Gruhn and Ralf Laue. (2005). Using timed model checking for verifying workflows. Computer Supported Activity Coordination, pp. 75–88.
Wil Janssen, Radu Mateescu, Sjouke Mauw, Peter Fennema, and Petra van der Stappen. (1999). Model checking for managers. Lecture notes in computer science(1680), pp. 92-107.
A. K. Alves de Medeiros, W. M. P. van der Aalst, and A.J.M.M. Weijters. (2008). Quantifying process equivalence based on observed behavior. Data & Knowledge Engineering(64), pp. 55-74.
Tadao Murata. (1989). Petri Nets: Properties, Analysis and Applications. IEEE, pp. 541-580.
A. Rozinat and W. M. P. van der Aalst. (2006). Conformance testing: measuring the fit and appropriateness of event logs and process models. Lecture Notes in Computer Science, 3812, pp. 163-176.
A. Rozinat and W. M. P. van der Aalst. (2006). Decision Mining in ProM. Lecture Notes in Computer Science(4102), pp. 420-425.
A. Rozinat and W. M. P. van der Aalst. (2008). Conformance checking of processes based on monitoring real behavior. Information Systems, 33, pp. 64-95.
A. Rozinat, R. S. Mans, and W. M. P. van der Aalst. (2006). Mining CPN models discovering process models with data from event logs.
A.J.M.M. Weijters and W.M.P van der Aalst. (2003). Rediscovering workflow models from event-based data using little thumb. Integrated Computer-Aided Engineering(10), pp. 151-162.
A.J.M.M. Weijters, W.M.P. van der Aalst, and A.K. Alves de Medeiros. (2006). Process mining with the heuristics miner algorithm.
Ke Xu, Lianchen Liu, and Cheng Wu. (2007). A three-layered method for business processes discovery andits application in manufacturing industry. Computers in Industry(58), pp. 265–278.
中文部分
方順逸, 黃培琳, 蕭惠元. (2004). 借鏡沙氏法案進行修法之探討. 貨幣觀測與信用評等(9月), pp. 37-51.
邢國印. (2008). 國際監理法規對企業內部控制之影響分析.
周濬坤. (2008). 強制性會計師更換:會計師懲戒與審計品質.
校內:2014-09-07公開