Process-mining-enabled audit of information systems: Methodology and an application

被引:26
|
作者
Zerbino, Pierluigi [1 ]
Aloini, Davide [1 ]
Dulmin, Riccardo [1 ]
Mininno, Valeria [1 ]
机构
[1] Univ Pisa, Dept Energy Syst Terr & Construct Engn, Largo Lucio Larmrino I, I-56122 Pisa, Italy
关键词
Information systems audit; Error detection; Process mining; Business process management (BPM); Risk management; Port community system (PCS); CONFORMANCE CHECKING; EXPERT-SYSTEM; ARTIFICIAL-INTELLIGENCE; MANAGEMENT; KNOWLEDGE; FRAUD;
D O I
10.1016/j.eswa.2018.05.030
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Current methodologies for Information Systems (ISs) audits suffer from some limitations that could question the effectiveness of such procedures in detecting deviations, frauds, or abuses. Process Mining (PM), a set of business-process-related diagnostic and improvement techniques, can tackle these weaknesses, but literature lacks contributions that address this possibility concretely. Thus, by framing PM as an Expert System (ES) engine, this paper presents a five-step PM-based methodology for IS audits and validates it through a case in a freight export port process managed by a Port Community System (PCS), an open electronic platform enabling information exchange among port stakeholders. The validation pointed out some advantages (e.g. depth of analysis, easier automation, less invasiveness) of our PM-enabled methodology over extant ESs and tools for IS audit. The substantive test and the check on the PCS processing controls and output controls allowed to identify four major non-conformances likely implying both legal and operational risks, and two unforeseen process deviations that were not known by the port authority, but that could improve the flexibility of the process. These outcomes set the stage for an export process reengineering, and for revising the boundaries in the process flow of the PCS. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:80 / 92
页数:13
相关论文
共 50 条
  • [21] Research and application on the Data mining technology in medical information systems
    Zhang, Jinhai
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 1734 - 1738
  • [22] The application of spatial data mining in railway geographic information systems
    Xu, W
    Qin, Y
    Huang, HK
    2003 IEEE INTELLIGENT TRANSPORTATION SYSTEMS PROCEEDINGS, VOLS. 1 & 2, 2003, : 1467 - 1471
  • [23] The Application of an Information Systems Development Methodology in Practice - An Exploratory Study
    Barrow, Rob
    Carroll, Jennie
    Smith, Ross
    Frampton, Keith
    PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2007, SECTIONS 1-6, 2007,
  • [24] The Research and Application of Security Requirements Analysis Methodology of Information Systems
    Cui, Jing-Song
    Zhang, Da
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 30 - 36
  • [25] The Application of Information Audit in Power Information System
    Yang, Fei
    INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND INTELLECTUALIZATION (ICEITI 2016), 2016, : 613 - 617
  • [26] Incorporating business process management into RFID-enabled application systems
    Zhao, Xiaohui
    Liu, Chengfei
    Lin, Tao
    BUSINESS PROCESS MANAGEMENT JOURNAL, 2010, 16 (06) : 932 - 953
  • [27] First Steps Towards Process Mining in Distributed Health Information Systems
    Helm, Emmanuel
    Paster, Ferdinand
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2015, 61 (02) : 137 - 142
  • [28] A Process Mining Based Service Composition Approach for Mobile Information Systems
    Huang, Chengxi
    Cai, Hongming
    Li, Yulai
    Du, Jiawei
    Bu, Fenglin
    Jiang, Lihong
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [29] Online Decision Mining and Monitoring in Process-Aware Information Systems
    Scheibel, Beate
    Rinderle-Ma, Stefanie
    CONCEPTUAL MODELING (ER 2022), 2022, 13607 : 271 - 280
  • [30] Behavior pattern mining: Apply process mining technology to common event logs of information systems
    Song, Jinliang
    Luo, Tiejian
    Chen, Su
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1800 - 1805