![]() |
Conformance Checking
Business process conformance checking (a.k.a. conformance checking for short) is a family of process mining techniques to compare a Process modeling, process model with an event log of the same process. It is used to check if the actual execution of a business process, as recorded in the event log, conforms to the model and vice versa. For instance, there may be a process model indicating that purchase orders of more than one million euros require two checks. Analysis of the event log will show whether this rule is followed or not. Another example is the checking of the so-called “Four-eyes principle, four-eyes” principle stating that particular activities should not be executed by one and the same person. By scanning the event log using a model specifying these requirements, one can discover potential cases of fraud. Hence, conformance checking may be used to detect, locate and explain deviations, and to measure the severity of these deviations. Overview Conformance checking ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
Conformance
Conformance is how well something, such as a product, service or a system, meets a specified standard and may refer more specifically to: * Conformance testing, testing to determine whether a product or system meets some specified standard * SNIA Conformance Testing Program, a program trying to bring third-party standards conformance to the storage networking marketplace See also * Conformation (other), a variety of similar concepts applied to chemicals or animals {{disambiguation ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
Process Mining
Process mining is a family of techniques for analyzing event data to understand and improve operational processes. Part of the fields of data science and Business_process_management, process management, process mining is generally built on Logging (computing), logs that contain case id, a unique identifier for a particular process instance; an activity, a description of the event that is occurring; a timestamp; and sometimes other information such as resources, costs, and so on. There are three main classes of process mining techniques: ''process discovery'', ''conformance checking'', and ''process enhancement''. In the past, terms like ''workflow mining'' and ''automated business process discovery'' (ABPD) were used. Overview Process mining techniques are often used when no formal description of the process can be obtained by other approaches, or when the quality of existing documentation is questionable. For example, application of process mining methodology to the audit trails o ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
Process Modeling
The term process model is used in various contexts. For example, in business process modeling the enterprise process model is often referred to as the ''business process model''. Overview Process models are processes of the same nature that are classified together into a model. Thus, a process model is a description of a process at the type level. Since the process model is at the type level, a process is an instantiation of it. The same process model is used repeatedly for the development of many applications and thus, has many instantiations. One possible use of a process model is to prescribe how things must/should/could be done in contrast to the process itself which is really what happens. A process model is roughly an anticipation of what the process will look like. What the process shall be will be determined during actual system development. Colette Rolland and Pernici, C. Thanos (1998). ''A Comprehensive View of Process Engineering. Proceedings of the 10th Internationa ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
![]() |
Event Log
In computing, logging is the act of keeping a log of events that occur in a computer system, such as problems, errors or broad information on current operations. These events may occur in the operating system or in other software. A message or ''log entry'' is recorded for each such event. These log messages can then be used to monitor and understand the operation of the system, to debug problems, or during an audit. Logging is particularly important in multi-user software, to have a central overview of the operation of the system. In the simplest case, messages are written to a file, called a ''log file''. Alternatively, the messages may be written to a dedicated logging system or to a log management software, where it is stored in a database or on a different computer system. Specifically, a ''transaction log'' is a log of the communications between a system and the users of that system, or a data collection method that automatically captures the type, content, or time of tr ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
Business Process
A business process, business method, or business function is a collection of related, structured activities or tasks performed by people or equipment in which a specific sequence produces a service or product (that serves a particular business goal) for a particular customer or customers. Business processes occur at all organizational levels and may or may not be visible to the customers. A business process may often be visualized (modeled) as a flowchart of a sequence of activities with interleaving decision points or as a process matrix of a sequence of activities with relevance rules based on data in the process. The benefits of using business processes include improved customer satisfaction and improved agility for reacting to rapid market change. Process-oriented organizations break down the barriers of structural departments and try to avoid functional silos. Overview A business process begins with a mission objective (an external event) and ends with achievement of the ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
![]() |
Purchase Order
A purchase order, often abbreviated to PO, is a commercial document issued by a buyer to a seller, indicating types, quantities, and agreed prices for products or services required. It is used to control the purchasing of products and services from external suppliers. Purchase orders can be an essential part of enterprise resource planning system orders. An indent is a purchase order often placed through an agent ( indent agent) under specified conditions of sale. The issue of a purchase order does not itself form a contract. If no prior contract exists, then it is the acceptance of the order by the seller that forms a contract A contract is an agreement that specifies certain legally enforceable rights and obligations pertaining to two or more parties. A contract typically involves consent to transfer of goods, services, money, or promise to transfer any of thos ... between the buyer and seller. Overview Purchase orders allow buyers to clearly and openly comm ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
![]() |
Four-eyes Principle
The two-person rule is a control mechanism designed to achieve a high level of security for especially critical material or operations. Under this rule, access and actions require the presence of two or more authorized people at all times. United States: nuclear weapons Per US Air Force Instruction (AFI) 91-104, "the two-person concept" is designed to prevent accidental or malicious launch of nuclear weapons by a single individual. In the case of Minuteman missile launch crews, once a launch order is received, both operators must agree that it is valid by comparing the authorization code in the order against a ''Sealed Authenticator'' (a special sealed envelope containing a verification code). These Sealed Authenticators are stored in a safe which has two separate locks. Each operator has the key to only one lock, so neither can open the safe alone. Also, each operator has one of two launch keys; once the order is verified, they must insert the keys in slots on the control panel ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
![]() |
Fraud
In law, fraud is intent (law), intentional deception to deprive a victim of a legal right or to gain from a victim unlawfully or unfairly. Fraud can violate Civil law (common law), civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensation) or criminal law (e.g., a fraud perpetrator may be prosecuted and imprisoned by governmental authorities), or it may cause no loss of money, property, or legal right but still be an element of another civil or criminal wrong. The purpose of fraud may be monetary gain or other benefits, such as obtaining a passport, travel document, or driver's licence. In cases of mortgage fraud, the perpetrator may attempt to qualify for a mortgage by way of false statements. Terminology Fraud can be defined as either a civil wrong or a criminal act. For civil fraud, a government agency or person or entity harmed by fraud may bring litigation to stop the fraud, seek monetary damages, or both. For cr ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
Linguistic Description
In the study of language, description or descriptive linguistics is the work of objectively analyzing and describing how language is actually used (or how it was used in the past) by a speech community. François & Ponsonnet (2013). All academic research in linguistics is descriptive; like all other scientific disciplines, it aims to describe reality, without the bias of preconceived ideas about how it ought to be. Modern descriptive linguistics is based on a structural approach to language, as exemplified in the work of Leonard Bloomfield and others. This type of linguistics utilizes different methods in order to describe a language such as basic data collection, and different types of elicitation methods. Descriptive versus prescriptive linguistics Linguistic description, as used in academic and professional linguistics, is often contrasted with linguistic prescription, — entry for "Descriptivism and prescriptivism" quotation: "Contrasting terms in linguistics." (p.286) ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
Normative
Normativity is the phenomenon in human societies of designating some actions or outcomes as good, desirable, or permissible, and others as bad, undesirable, or impermissible. A Norm (philosophy), norm in this sense means a standard for evaluating or making judgments about behavior or outcomes. "Normative" is sometimes also used, somewhat confusingly, to mean relating to a descriptive standard: doing what is normally done or what most others are expected to do in practice. In this sense a norm is not evaluative, a basis for judging behavior or outcomes; it is simply a fact or observation about behavior or outcomes, without judgment. Many researchers in science, law, and philosophy try to restrict the use of the term "normative" to the evaluative sense and refer to the description of behavior and outcomes as positive, descriptive, predictive, or empirical. ''Normative'' has specialized meanings in different academic disciplines such as philosophy, social sciences, and law. In most ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
![]() |
Deviation (statistics)
In mathematics and statistics, deviation serves as a measure to quantify the disparity between an observed value of a variable and another designated value, frequently the mean of that variable. Deviations with respect to the sample mean and the population mean (or "true value") are called errors and residuals, ''errors'' and ''residuals'', respectively. The Sign (mathematics), sign of the deviation reports the direction of that difference: the deviation is positive when the observed value exceeds the reference value. The absolute value of the deviation indicates the size or magnitude of the difference. In a given sample (statistics), sample, there are as many deviations as sample points. Summary statistics can be derived from a set of deviations, such as the ''standard deviation'' and the ''mean absolute deviation'', measures of statistical dispersion, dispersion, and the ''mean signed deviation'', a measure of bias of an estimator, bias. The deviation of each data point is calc ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
Behavior
Behavior (American English) or behaviour (British English) is the range of actions of Individual, individuals, organisms, systems or Artificial intelligence, artificial entities in some environment. These systems can include other systems or organisms as well as the inanimate physical environment. It is the computed response of the system or organism to various stimuli or inputs, whether internal or external, conscious or subconscious, overt or covert, and voluntary action, voluntary or Volition (psychology), involuntary. While some behavior is produced in response to an organism's environment (extrinsic motivation), behavior can also be the product of intrinsic motivation, also referred to as "agency" or "free will". Taking a behavior informatics perspective, a behavior consists of actor, operation, interactions, and their properties. This can be represented as a behavior Euclidean vector, vector. Models Biology Definition Behavior may be defined as "the internally coordin ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |