{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T23:47:55Z","timestamp":1767916075074,"version":"3.49.0"},"reference-count":51,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2012,1,27]],"date-time":"2012-01-27T00:00:00Z","timestamp":1327622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1,27]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to provide industrial managers with insight into the real\u2010time progress of running processes. The authors formulated a periodic performance prediction algorithm for use in a proposed novel approach to real\u2010time business process monitoring.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>In the course of process executions, the final performance is predicted probabilistically based on partial information. Imputation method is used to generate probable progresses of ongoing process and Support Vector Machine classifies the performances of them. These procedures are periodically iterated along with the real\u2010time progress in order to describe the ongoing status.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The proposed approach can describe the ongoing status as the probability that the process will be executed continually and terminated as the identical result. Furthermore, before the actual occurrence, a proactive warning can be provided for implicit notification of eventualities if the probability of occurrence of the given outcome exceeds the threshold.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The performance of the proactive warning strategy was evaluated only for accuracy and proactiveness. However, the process will be improved by additionally considering opportunity costs and benefits from actual termination types and their warning errors.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Whereas the conventional monitoring approaches only classify the already occurred result of a terminated instance deterministically, the proposed approach predicts the possible results of an ongoing instance probabilistically over entire monitoring periods. As such, the proposed approach can provide the real\u2010time indicator describing the current capability of ongoing process.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635571211193617","type":"journal-article","created":{"date-parts":[[2012,1,14]],"date-time":"2012-01-14T07:18:00Z","timestamp":1326525480000},"page":"4-23","source":"Crossref","is-referenced-by-count":33,"title":["Periodic performance prediction for real\u2010time business process monitoring"],"prefix":"10.1108","volume":"112","author":[{"given":"Bokyoung","family":"Kang","sequence":"first","affiliation":[]},{"given":"Dongsoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Suk\u2010Ho","family":"Kang","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020420401527500_b1","doi-asserted-by":"crossref","unstructured":"Beckett, A.J., Wainwright, C.E.R. and Bance, D. (2000), \u201cImplementing an industrial continuous improvement system: a knowledge management case study\u201d, Industrial Management & Data Systems, Vol. 100 No. 7, pp. 330\u20108.","DOI":"10.1108\/02635570010349113"},{"key":"key2022020420401527500_b2","doi-asserted-by":"crossref","unstructured":"Bose, R. (2006), \u201cUnderstanding management data systems for enterprise performance management\u201d, Industrial Management & Data Systems, Vol. 106 No. 1, pp. 43\u201059.","DOI":"10.1108\/02635570610640988"},{"key":"key2022020420401527500_b3","unstructured":"Buytendijk, F. and Flint, D. (2002), \u201cHow BAM can turn a business into a real\u2010time enterprise\u201d, Gartner Research Note, AV\u201015\u20104650, Gartner, Stamford, CT."},{"key":"key2022020420401527500_b4","doi-asserted-by":"crossref","unstructured":"Castellanos, M., Salazar, N., Casati, F., Dayal, U. and Shan, M.\u2010C. (2006), \u201cPredictive business operations management\u201d, International Journal of Computational Science and Engineering, Vol. 2 Nos 5\/6, pp. 292\u2010301.","DOI":"10.1504\/IJCSE.2006.014772"},{"key":"key2022020420401527500_b5","doi-asserted-by":"crossref","unstructured":"Chou, P.\u2010H., Wu, M.\u2010J. and Chen, K.\u2010K. (2010), \u201cIntegrating support vector machine and genetic algorithm to implement dynamic wafer quality prediction system\u201d, Expert Systems with Applications, Vol. 37 No. 6, pp. 4413\u201024.","DOI":"10.1016\/j.eswa.2009.11.087"},{"key":"key2022020420401527500_b6","doi-asserted-by":"crossref","unstructured":"Curtis, B., Seshagiri, G.V., Reifer, D., Hirmanpour, I. and Keeni, G. (2008), \u201cThe cases for quantitative process management\u201d, IEEE Software, Vol. 25 No. 3, pp. 24\u20108.","DOI":"10.1109\/MS.2008.80"},{"key":"key2022020420401527500_b7","unstructured":"Davenport, T.H. and Short, J.E. (1990), \u201cThe new industrial engineering: information technology and business process redesign\u201d, Sloan Management Review, Vol. 31 No. 4, pp. 11\u201027."},{"key":"key2022020420401527500_b8","unstructured":"Drobik, A., Raskino, M., Flint, D., Austin, T., MacDonald, N. and McGee, K. (2002), \u201cThe gartner definition of real\u2010time enterprise\u201d, Gartner Research Note, COM\u201018\u20103057, Gartner, Stamford, CT."},{"key":"key2022020420401527500_b9","doi-asserted-by":"crossref","unstructured":"Ek, A.R., Robinson, A.P., Radtke, P.J. and Walters, D.K. (1997), \u201cDevelopment and testing of regeneration imputation models for forests in Minnesota\u201d, Forest Ecology and Management, Vol. 94 Nos 1\u20103, pp. 129\u201040.","DOI":"10.1016\/S0378-1127(96)03970-9"},{"key":"key2022020420401527500_b10","unstructured":"Frank, A and Asuncion, A. (2010), UCI Machine Learning Repository, University of California, School of Information and Computer Science, Irvine, CA, available at: http:\/\/archive.ics.uci.edu\/ml."},{"key":"key2022020420401527500_b11","unstructured":"Grigori, D., Casati, F., Dayal, U. and Shan, M.\u2010C. (2001), \u201cImproving business process quality through exception understanding, prediction, and prevention\u201d, Proceedings of the 27th Very Large Data Base Endowment Conference, Roma, Italy, pp. 159\u201068."},{"key":"key2022020420401527500_b12","doi-asserted-by":"crossref","unstructured":"Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M. and Shan, M.\u2010C. (2004), \u201cBusiness process intelligence\u201d, Computers in Industry, Vol. 53 No. 3, pp. 321\u201043.","DOI":"10.1016\/j.compind.2003.10.007"},{"key":"key2022020420401527500_b13","doi-asserted-by":"crossref","unstructured":"Gulledge, T.R. (2007), \u201cArchitecture\u2010driven enterprise integration\u201d, International Journal of Management and Enterprise Development, Vol. 4 No. 5, pp. 535\u201051.","DOI":"10.1504\/IJMED.2008.017433"},{"key":"key2022020420401527500_b14","doi-asserted-by":"crossref","unstructured":"Ho, G.T.S., Lau, H.C.W., Chung, S.H., Fung, R.Y.K., Chan, T.M. and Lee, C.K.M. (2008), \u201cFuzzy rule sets for enhancing performance in a supply chain network\u201d, Industrial Management & Data Systems, Vol. 108 No. 7, pp. 947\u201072.","DOI":"10.1108\/02635570810898017"},{"key":"key2022020420401527500_b15","unstructured":"Jeng, J.\u2010J. (2006), \u201cService\u2010oriented business performance management for real\u2010time enterprise\u201d, Proceedings of the 8th IEEE International Conference on E\u2010Commerce Technology and the 3rd IEEE International Conference on Enterprise Computing, E\u2010Commerce, and E\u2010Services, San Francisco, CA, USA."},{"key":"key2022020420401527500_b16","unstructured":"Kalton, G. and Kasprzyk, D. (1986), \u201cThe treatment of missing survey data\u201d, Survey Methodology, Vol. 12 No. 1, pp. 1\u201016."},{"key":"key2022020420401527500_b17","unstructured":"Kang, B., Cho, N.W. and Kang, S.\u2010H. (2009a), \u201cReal\u2010time risk measurement for business activity monitoring (BAM)\u201d, International Journal of Innovative Computing, Information and Control, Vol. 5 No. 11, pp. 3647\u201057."},{"key":"key2022020420401527500_b18","doi-asserted-by":"crossref","unstructured":"Kang, B., Jung, J.\u2010Y., Cho, N.W. and Kang, S.\u2010H. (2011), \u201cReal\u2010time business process monitoring using formal concept analysis\u201d, Industrial Management & Data Systems, Vol. 111 No. 5, pp. 652\u201074.","DOI":"10.1108\/02635571111137241"},{"key":"key2022020420401527500_b19","doi-asserted-by":"crossref","unstructured":"Kang, B., Lee, S.K., Min, Y., Kang, S.\u2010H. and Cho, N.W. (2009b), \u201cReal\u2010time process quality control for business activity monitoring\u201d, Proceedings of the 2009 International Conference on Computational Science and its Applications, Yongin, South Korea, pp. 237\u201042.","DOI":"10.1109\/ICCSA.2009.15"},{"key":"key2022020420401527500_b21","doi-asserted-by":"crossref","unstructured":"Kim, J. and Curry, J. (1977), \u201cThe treatment of missing data in multivariate analysis\u201d, Sociological Methods Research, Vol. 6 No. 2, pp. 215\u201040.","DOI":"10.1177\/004912417700600206"},{"key":"key2022020420401527500_b20","doi-asserted-by":"crossref","unstructured":"Kim, K., Choi, I. and Park, C. (2010), \u201cA rule\u2010based approach to proactive exception handling in business processes\u201d, Expert Systems with Applications, Vol. 38 No. 1, pp. 394\u2010409.","DOI":"10.1016\/j.eswa.2010.06.078"},{"key":"key2022020420401527500_b22","doi-asserted-by":"crossref","unstructured":"Korhonen, K.T. and Kangas, A. (1997), \u201cApplication of nearest\u2010neighbor regression for generalizing sample tree information\u201d, Scandinavian Journal of Forest Research, Vol. 12 No. 1, pp. 97\u2010101.","DOI":"10.1080\/02827589709355389"},{"key":"key2022020420401527500_b23","doi-asserted-by":"crossref","unstructured":"Lam, C.Y., Ip, W.H. and Lau, C.W. (2009), \u201cA business process activity model and performance measurement using a time series ARIMA intervention analysis\u201d, Expert Systems with Applications, Vol. 36 No. 3, pp. 6986\u201094.","DOI":"10.1016\/j.eswa.2008.08.027"},{"key":"key2022020420401527500_b24","doi-asserted-by":"crossref","unstructured":"Lee, Y.S., Bae, J.H. and Shin, S. (2005), \u201cDevelopment of quality evaluation metrics for BPM (business process management) system\u201d, Proceedings of the Fourth Annual ACIS International Conference on Computer and Information Science, IEEE Computer Society, Jeju Island, pp. 424\u20109.","DOI":"10.1109\/ICIS.2005.54"},{"key":"key2022020420401527500_b25","doi-asserted-by":"crossref","unstructured":"Leitner, P., Wetzstein, B., Rosenberg, F., Michlmayr, A., Dustdar, S. and Leymann, F. (2009), \u201cRuntime prediction of service level agreement violations for composite services\u201d, Proceedings of the 3rd Workshop on Non Functional Properties and SLA Management in Service Oriented Computing (NFPSLAM\u2010SOC'09), pp. 176\u201086.","DOI":"10.1007\/978-3-642-16132-2_17"},{"key":"key2022020420401527500_b26","doi-asserted-by":"crossref","unstructured":"Little, R.J.A. and Rubin, D.B. (2002), Statistical Analysis with Missing Data, 2nd ed., Wiley, New York, NY.","DOI":"10.1002\/9781119013563"},{"key":"key2022020420401527500_b29","unstructured":"McCoy, D.W. (2002), \u201cBusiness activity monitoring: calm before the storm\u201d, Gartner Research Note, LE\u201015\u20109727, Gartner, Stamford, CT."},{"key":"key2022020420401527500_b27","doi-asserted-by":"crossref","unstructured":"Ma, C.Y. and Wang, X.Z. (2009), \u201cInductive data mining based on genetic programming: automatic generation of decision trees from data for process historical data analysis\u201d, Computers & Chemical Engineering, Vol. 33 No. 10, pp. 1602\u201016.","DOI":"10.1016\/j.compchemeng.2009.04.005"},{"key":"key2022020420401527500_b28","doi-asserted-by":"crossref","unstructured":"Maltamo, M. and Kangas, A. (1998), \u201cMethods based on k\u2010nearest neighbor regression in the prediction of basal area diameter distribution\u201d, Canadian Journal of Forest Research, Vol. 28 No. 8, pp. 1107\u201015.","DOI":"10.1139\/x98-085"},{"key":"key2022020420401527500_b30","unstructured":"Moeur, M. and Stage, A.R. (1995), \u201cMost similar neighbor: an improved sampling inference procedure for natural resource planning\u201d, Forest Science, Vol. 41 No. 2, pp. 337\u201059."},{"key":"key2022020420401527500_b31","unstructured":"Muehlen, M. (2001), \u201cWorkflow\u2010based process controlling \u2013 or: what you can measure you can control\u201d, Workflow Handbook, Future Strategies, Wallsend, pp. 61\u201077."},{"key":"key2022020420401527500_b32","doi-asserted-by":"crossref","unstructured":"Negash, S. (2004), \u201cBusiness intelligence\u201d, Communications of the Association for Information Systems, Vol. 13 No. 1, pp. 177\u201095.","DOI":"10.17705\/1CAIS.01315"},{"key":"key2022020420401527500_b33","doi-asserted-by":"crossref","unstructured":"Peddabachigari, S., Abraham, A., Grosan, C. and Thomas, J. (2007), \u201cModeling intrusion detection system using hybrid intelligent systems\u201d, Journal of Network and Computer Applications, Vol. 30 No. 1, pp. 114\u201032.","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"key2022020420401527500_b34","doi-asserted-by":"crossref","unstructured":"Pokrajac, D., Lazarevic, A. and Latecki, L.J. (2007), \u201cIncremental local outlier detection for data streams\u201d, Proceedings of IEEE Symposium on Computational Intelligence and Data Mining (CIDM), Honolulu, HI, USA, pp. 504\u201015.","DOI":"10.1109\/CIDM.2007.368917"},{"key":"key2022020420401527500_b35","doi-asserted-by":"crossref","unstructured":"Rao, U.S., Kestur, S. and Pradhan, C. (2008), \u201cStochastic optimization modeling and quantitative project management\u201d, IEEE Software, Vol. 25 No. 3, pp. 29\u201036.","DOI":"10.1109\/MS.2008.77"},{"key":"key2022020420401527500_b36","doi-asserted-by":"crossref","unstructured":"Rusinov, L.A., Rudakova, I.V. and Kurkina, V.V. (2007), \u201cReal time diagnostics of technological processes and field equipment\u201d, Chemometrics and Intelligent Laboratory Systems, Vol. 88 No. 1, pp. 18\u201025.","DOI":"10.1016\/j.chemolab.2006.11.007"},{"key":"key2022020420401527500_b37","doi-asserted-by":"crossref","unstructured":"Shafer, J.L. (1997), Analysis of Incomplete Multivariate Data, Chapman & Hall, London.","DOI":"10.1201\/9781439821862"},{"key":"key2022020420401527500_b38","unstructured":"Sinur, J. and Bell, T. (2003), \u201cA BPM taxonomy: creating clarity in a confusing market\u201d, Gartner Research Note, T\u201018\u20109669, Gartner, Stamford, CT."},{"key":"key2022020420401527500_b39","doi-asserted-by":"crossref","unstructured":"Strike, K., Emam, K.E. and Madhavji, N. (2001), \u201cSoftware cost estimation with incomplete data\u201d, IEEE Transactions on Software Engineering, Vol. 27 No. 10, pp. 890\u2010908.","DOI":"10.1109\/32.962560"},{"key":"key2022020420401527500_b40","doi-asserted-by":"crossref","unstructured":"Vapnik, V. (1999), \u201cAn overview of statistical learning theory\u201d, IEEE Transactions on Neural Networks, Vol. 10 No. 5, pp. 988\u201099.","DOI":"10.1109\/72.788640"},{"key":"key2022020420401527500_b41","doi-asserted-by":"crossref","unstructured":"Walks, S. (1932), \u201cMoments and distributions of estimates of population parameters from fragments samples\u201d, Annals of Mathematical Statistics, Vol. 3, pp. 163\u2010203.","DOI":"10.1214\/aoms\/1177732885"},{"key":"key2022020420401527500_b42","doi-asserted-by":"crossref","unstructured":"Wang, D. and Romagnoli, J.A. (2005), \u201cRobust multi\u2010scale principal components analysis with applications to process monitoring\u201d, Journal of Process Control, Vol. 15 No. 8, pp. 869\u201082.","DOI":"10.1016\/j.jprocont.2005.04.001"},{"key":"key2022020420401527500_b43","doi-asserted-by":"crossref","unstructured":"Weller, E. and Card, D. (2008), \u201cPoint argument: applying SPC to software development: where and why\u201d, IEEE Software, Vol. 25 No. 3, pp. 48\u201051.","DOI":"10.1109\/MS.2008.68"},{"key":"key2022020420401527500_b44","unstructured":"Weske, M. (2007), Business Process Management: Concepts, Languages, Architectures, Springer, New York, NY."},{"key":"key2022020420401527500_b46","doi-asserted-by":"crossref","unstructured":"Wetzstein, B., Strauch, S. and Leymann, F. (2009a), \u201cMeasuring performance metrics of WS\u2010BPEL service compositions\u201d, Proceedings of the Fifth International Conference on Networking and Services, IEEE Computer Society, Valencia.","DOI":"10.1109\/ICNS.2009.80"},{"key":"key2022020420401527500_b45","doi-asserted-by":"crossref","unstructured":"Wetzstein, B., Leitner, P., Rosenberg, F., Brandic, I., Dustdar, S. and Leymann, F. (2009b), \u201cMonitoring and analyzing influential factors of business process performance\u201d, Proceedings of the 13th IEEE International Enterprise Distributed Object Computing Conference, Auckland, New Zealand, pp. 141\u201050.","DOI":"10.1109\/EDOC.2009.18"},{"key":"key2022020420401527500_b47","doi-asserted-by":"crossref","unstructured":"Widodo, A. and Yang, B.\u2010S. (2007), \u201cSupport vector machine in machine condition monitoring and fault diagnosis\u201d, Mechanical Systems and Signal Processing, Vol. 21 No. 6, pp. 2560\u201074.","DOI":"10.1016\/j.ymssp.2006.12.007"},{"key":"key2022020420401527500_b48","doi-asserted-by":"crossref","unstructured":"Wu, Q. (2011), \u201cHybrid fuzzy support vector classifier machine and modified genetic algorithm for automatic car assembly fault diagnosis\u201d, Expert Systems with Applications, Vol. 38 No. 3, pp. 1457\u201063.","DOI":"10.1016\/j.eswa.2010.07.052"},{"key":"key2022020420401527500_b49","doi-asserted-by":"crossref","unstructured":"Yeh, C.\u2010C., Chi, D.\u2010J. and Hsu, M.\u2010F. (2010), \u201cA hybrid approach of DEA, rough set and support vector machines for business failure prediction\u201d, Expert Systems with Applications, Vol. 37 No. 2, pp. 1535\u201041.","DOI":"10.1016\/j.eswa.2009.06.088"},{"key":"key2022020420401527500_b50","doi-asserted-by":"crossref","unstructured":"Yeh, I.\u2010C. (1998), \u201cModeling of strength of high performance concrete using artificial neural networks\u201d, Cement and Concrete Research, Vol. 28 No. 12, pp. 1797\u2010808.","DOI":"10.1016\/S0008-8846(98)00165-3"},{"key":"key2022020420401527500_b51","doi-asserted-by":"crossref","unstructured":"Zhao, F., Chen, J., Dong, G. and Guo, L. (2010), \u201cSOA\u2010based remote condition monitoring and fault diagnosis system\u201d, The International Journal of Advanced Manufacturing Technology, Vol. 46 No. 9, pp. 1191\u2010200.","DOI":"10.1007\/s00170-009-2178-5"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635571211193617","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571211193617\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571211193617\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:38Z","timestamp":1753400318000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/112\/1\/4-23\/174966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,27]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1,27]]}},"alternative-id":["10.1108\/02635571211193617"],"URL":"https:\/\/doi.org\/10.1108\/02635571211193617","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2012,1,27]]}}}