Skip to main content

Taxonomy of Anomalies in Business Process Models

  • Conference paper
  • First Online:
Information System Development

Abstract

Anomalies in business process models refer to deviations from their expected structure, functionality, behavior, semantics, use of concepts and their expression, among others. The research in this paper focuses on anomalies in business process models with the aim to propose taxonomy of anomalies and devise ways to avoid them or to eliminate them when they occur. Anomalies are divided into basic categories and subcategories to the level of granularity that allows their differentiation, description of their specific causes and workarounds as well as their expression in the pattern format.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):1–58

    Article  Google Scholar 

  2. Teng H, Chen K, Lu S (1990) Adaptive real-time anomaly detection using inductively generated sequential patterns. In: Proceedings of IEEE computer society symposium on research in security and privacy. IEEE Computer Society, pp 278–284

    Google Scholar 

  3. Solti-Rogge A, Kunze M, Awad A, Weske M (2011) Business process configuration wizard and consistency checker for bpmn 2.0. In: 12th international conference, BPMDS 2011 and 16th international conference, EMMSAD 2011 held at CAiSE 2011, London, UK, June 2011, Proceedings. Springer, Berlin, pp 231–245

    Google Scholar 

  4. Awad A, Decker G, Lohmann N (2010) Diagnosing and repairing data anomalies in process models. In: Business process management workshops, BPM 2009 international workshops, Ulm, Germany, September 2009. Springer, Berlin, pp 5–16

    Google Scholar 

  5. Kim GW, Lee JH, Soon JH (2009) Classification and analyses of business process anomalies. In: Communication software and networks. ICCSN’09. International. pp 433–437

    Google Scholar 

  6. Dohring M, Heublein S (2012) Anomalies in rule-adopted workflows – a taxonomy and solutuions for vBPMN. In: 6th European conference on software maintenance and reengineering. IEEE, Szeged, Hungary, pp 117–126

    Google Scholar 

  7. Olkhovich L (2006) Semi-automatic business process performance optimization based on redundant control flow detection. In: AICT-ICIW’06. p 146

    Google Scholar 

  8. Dohring M, Zimmermann B (2011) vBPMN: event-aware work-flow variants by weaving BPMN2 and business rules. In: EMM-SAD. Springer, London, pp 332–341

    Google Scholar 

  9. Business Process Model and Notation (BPMN) 2.0 (2011) Object management group, Technical Report

    Google Scholar 

  10. Sadiq W, Orlowska ME (1999) Applying graph reduction techniques for identifying structural conflicts in process models. In: CAiSE’99. Springer, London

    Google Scholar 

  11. Rinderle S, Reichert M, Dadam P (2004) Correctness criteria for dynamic changes in workflow systems: a survey. DKE 50(1):9–34

    Article  Google Scholar 

  12. Sun SX, Zhao JL, Nunamaker JF, Sheng ORL (2006) Formulating the data-flow perspective for business process management. Inform Syst Res 17(4):374–391

    Article  Google Scholar 

  13. Laue R, Awad A (2010) Visualization of business process modeling anti patterns. Proceeding of ECEASST. Chapter 25. pp 1–12

    Google Scholar 

  14. Zaidi AK, Levis AH (1997) Validation and verification of decision making rules. Automatica 33(2):155–169

    Article  MATH  MathSciNet  Google Scholar 

  15. Strahonja V (2006) Modeling legislation by using Uml state machine diagrams. In: Conference proceedings of the Canadian conference on electrical and computer engineering (IEEE CCECE 2006). pp 624–627

    Google Scholar 

  16. Eessaar E (2007) Using metamodeling in order to evaluate data models. In: AIKED’07 Proceedings of the 6th conference on 6th WSEAS international conference on artificial intelligence, knowledge engineering and data bases – vol 6. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, WI

    Google Scholar 

  17. Emerson MJ, Sztipanovits J (2004) Implementing a MOF-based metamodeling environment using graph transformations. In: 4th OOPSLA workshop on domain-specific modeling. pp 83–92

    Google Scholar 

  18. Breton E, Bézivin J (2000) An overview of industrial process meta-models. In: 13th international conference software and system engineering and their applications, ICSSEA 2000–14, Paris, France

    Google Scholar 

  19. Kretschmer P (2011) JWT metamodel compared to BPMN metamodel. http://wiki.eclipse.org/JWT_Metamodel. Last accessed on June 2014

  20. The Rules of BPMN. http://brsilver.com/the-rules-of-bpmn/. Last accessed on June 2014

  21. Rozman T, Polancic G, Vajde Horvat R (2008) Analysis of most common process modeling mistakes in BPMN process models. In: 2008 BPM and workflow handbook. Future Strategies, pp 293–306

    Google Scholar 

  22. Aalst W, Hofstede A, Kiepuszewski B, Barros A (2003) Workflow patterns. Distributed and Parallel Databases 14:5–51

    Article  Google Scholar 

  23. Aalst W (2000) Workflow verification: finding control-flow errors using petri net-based techniques. In: van der Aalst W, Desel J, Oberweis A (eds) Proceedings of business process management: models, techniques and empirical studies, vol 1806, Lecture notes in computer science. Springer, Heidelberg, pp 161–183

    Chapter  Google Scholar 

  24. Mendling J (2009) Empirical studies in process model verification. In: van der Aalst J (ed) Transactions on petri nets and other models of concurrency II, vol 5460, Lecture notes in computer science. Springer, Heidelberg, pp 208–224

    Chapter  Google Scholar 

  25. Larson AJ, Navathe BS, Elmasri R (1989) A theory of attribute equivalence in database with application to shema integration. Trans Softw Eng 15:449–463

    Article  MATH  Google Scholar 

Download references

Acknowledgments

The research presented in this paper, conducted within the doctoral dissertation of T. Vidacic, is part of the project “Modeling of procedural regulation” funded by the Ministry of Science, Education and Sports of the Republic of Croatia (Nr. 016-0161217-0870), led by Prof. V. Strahonja, Ph.D.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tomislav Vidacic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Vidacic, T., Strahonja, V. (2014). Taxonomy of Anomalies in Business Process Models. In: José Escalona, M., Aragón, G., Linger, H., Lang, M., Barry, C., Schneider, C. (eds) Information System Development. Springer, Cham. https://doi.org/10.1007/978-3-319-07215-9_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07215-9_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07214-2

  • Online ISBN: 978-3-319-07215-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics