Fraud detection on event logs of goods and services procurement business process using Heuristics Miner algorithm

Dewi Rahmawati, Muhammad Ainul Yaqin, Riyanarto Sarno

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

23 Citations (Scopus)

Abstract

Event logs are history records that contain sequence data for the activity of a case that has been executed by an information system. Event logs can be valuable information with a technique called mining process. With this technique, cheating on the business processes of an enterprise can be detected early on. Thus, the company can commit further examination of business processes, especially the business process of procurement of goods and services to achieve business process is expected.[8] In this study, management data of event log obtained from log data at each event transaction procurement and services. The event log data is then analyzed using a heuristic miner algorithm. Heuristics miner algorithm chosen because it has advantages that are not owned by Alpha++ algorithm that this algorithm can calculate the frequency relation between activities in the log to determine the causal dependency. Heuristic Miner can be used to determine the predominant process of thousands of logs and detect behaviors that are not common in a process.[11] This study aims to detect anomalies on business processes that occur during the process of procurement of goods and services by calculating the fitness value of the event log into the system. Heuristic miner algorithm using the results obtained identification accuracy of 0.88%.

Original languageEnglish
Title of host publicationProceedings of 2016 International Conference on Information and Communication Technology and Systems, ICTS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages249-254
Number of pages6
ISBN (Electronic)9781509013791
DOIs
Publication statusPublished - 24 Apr 2017
Event2016 International Conference on Information and Communication Technology and Systems, ICTS 2016 - Surabaya, Indonesia
Duration: 12 Oct 2016 → …

Publication series

NameProceedings of 2016 International Conference on Information and Communication Technology and Systems, ICTS 2016

Conference

Conference2016 International Conference on Information and Communication Technology and Systems, ICTS 2016
Country/TerritoryIndonesia
CitySurabaya
Period12/10/16 → …

Keywords

  • event logs
  • fraud
  • heuristic miner
  • process mining
  • procurement

Fingerprint

Dive into the research topics of 'Fraud detection on event logs of goods and services procurement business process using Heuristics Miner algorithm'. Together they form a unique fingerprint.

Cite this