Next Article in Journal
Offensive-Language Detection on Multi-Semantic Fusion Based on Data Augmentation
Previous Article in Journal
A New Integrated Multi-Criteria Decision-Making Model for Resilient Supplier Selection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Model to Program and Blockchain Approaches for Business Processes and Workflows in Finance

1
Information Systems Department, Faculty of Informatics Pázmány Péter 1/C, Eötvös Loránd University (ELTE), 1117 Budapest, Hungary
2
Polytech Nice Sophia, Campus ShopiaTech, Université Cote d’Azur, 930 Route des Colles, 06410 Biot, France
*
Authors to whom correspondence should be addressed.
Appl. Syst. Innov. 2022, 5(1), 10; https://doi.org/10.3390/asi5010010
Submission received: 6 December 2021 / Revised: 29 December 2021 / Accepted: 30 December 2021 / Published: 4 January 2022
(This article belongs to the Section Information Systems)

Abstract

:
Business process modeling and verification have become an essential way to control and assure organizational evolution. We overview the opportunities for the application of blockchain in Business Process Management and Modeling in Finance and we focus on in-depth analysis of claim process in insurance as a use case. We investigate the utilization of blockchain technology for model checking of Workflow, Business Processes to ensure consistency, integrity, and security in a dynamically changing business environment. We create a UML profile for the blockchain, then we combine it with a UML activity diagram followed by a verification using Petri nets to guarantee a distributed computing system and scalable with mutable data. Our paper creates a unified picture of the approaches towards business processes modeling used in the financial industry organized around the set of premises intending to develop a future research agenda for blockchain business process modeling, specifically for the financial industry domain.

1. Introduction

Business process modeling aims to describe the organization and operational processes of an enterprise. Modeling uses many different methods that can help understand and summarize how models work. Modeling allows the simulation of business processes for comparison of different scenarios, allows the analysis and restructuring of the enterprise to improve performance, and to get a correct generated program from our model. Different approaches and techniques are used for modeling business processes.
Previous research [1] analyzes how the processing flows are checked for correctness in syntax and simulates how they should be executed to achieve better results. Therefore, some organizations and standards standardize some aspects of workflows and provide different design notations. But UML and SysML [2] activity diagrams (AD) and Business Process Modeling Notation (BPMN) are mostly used to provide an easily readable graphical notation for workflow processes [3]. In this study, the UML activity diagram is used because it is easy to read and can be easily extended and adapted with UML profiles to use Blockchain.
A blockchain is a system for recording information in a way that makes it difficult or impossible to alter, hack, or defraud the system. Blockchain has only recently been used in insurance companies [4,5]. It is used to automate insurance claims by tracking compromises made between different parties without paperwork. It will facilitate quick approval of claims and renewals. It will also be used to automate payments for claims, thereby reducing administrative costs.
Model to Program (M2P) approach is the technique or method of transforming a model into a final product (program) [6]. It uses various transformation techniques between different types of business process workflow modeling methods of business systems, especially those with complex and concurrent workflow processes. Model transformation is considered the fundamental method in Model Driven Architecture (MDA).
In the seminal work of the author of [7], the basic principles of modeling and its relationship to program generation are stated. This approach introduced a new line of thought in the field. Since the model transformation helps to minimize the development time of the system, thereby reducing the “time-to-market” factor of the final product [8], we transform the model into Petri nets after creating a complete diagram (UML AD and blockchain) into the same extended diagram using the UML profile.
Petri nets are one of the most powerful formal models for representing work, control, and information flows [9]. It helps in the formal description, modeling, and formal analysis of information systems and business process modeling. Its techniques, features, and concepts follow a balanced combination of powerful, easy-to-use, and natural approaches to describe and analyze the flow of information and control processes throughout the system structure.
The motivation behind our work is to take advantage of UML AD in modeling business processes and applying blockchain technologies to maintain integrity in the insurance industry. In our work, we combined UML-AD and blockchain in one model before transforming them into formal Petri nets. In Section 2, we mention related work on Blockchain, modeling with UML-AD, model transformation, and modeling with Petri nets. In Section 3, we discuss research issues in the context of information systems and case studies. Then we show the combination of blockchain with UML-AD and the transformation to Petri nets, followed by a discussion. Finally, a conclusion with possible future work.

2. Literature Review

At a high level, UML and BPMN are designed for participants and other stakeholders of the business processes to gain easy understanding through a visual representation [10] and provide enough detail to enable accurate execution. Business process modeling has many benefits, such as improving efficiency and saving time, as well as ensuring consistency and standardization across the organization. [11] provides an overview of business process modeling (BPMN) tools. Another work [3] shows a comparison of the UML activity diagram and BPMN in business process modeling. The authors in [12] propose an extension of UML activity diagrams to obtain a specification of the business process model and requirements using the UML profile. We choose to extend UML-AD using the UML profile as well. Modeling with UML [13] is effective and easy to use, but needs more formal verification.
For the verification of models and more formality, Petri nets describe and analyze the information flow of information and control processes throughout the whole system structure. Petri nets are used to determine if the model is working correctly and to determine as well if the Petri net is correctly modeling the actual system. It is used by many researchers, Ref. [14] presents a guide to modeling, verification, and application of Petri nets for systems engineering. Ref. [15] integrates UML and widely used CASE tools with Petri nets in software engineering. Refs. [16,17] proposes a mapping from a core set of BPMN to labeled Petri nets. Another work [18], proposes to ensure equivalence between a set of modeling elements in activity diagrams and their corresponding Petri nets. A transformation from SysML AD to Petri nets has been presented that allows behavioral modelers to reduce verification costs by identifying potential design flaws in behavioral models specified as activity diagrams before implementation. Some other work shows the comparison of Petri nets and activity diagrams for workflow modeling [19], which helps us before performing the transformation.
In our work, we combined blockchain and activity diagrams. Blockchain is known as the core technology behind cryptocurrencies and bitcoin [20]. The blockchain technology major component is a ledger for transactions with unique characteristics that assist to support maintaining integrity, consistency, data protection and security in systems and business processes [21]. It offers easier traceability, increased security, and greater transparency. Reference [22] gives a comprehensive overview of blockchain technology and highlights challenges, opportunities, and future directions of blockchain technologies. Nowadays, blockchain is used in numerous fields [23] such as cryptocurrency, finance, advertising, medicine, healthcare, and insurance [24,25]. References [26,27,28] show using blockchain technologies in finance. Ref. [5] presents the case study of an Italian insurance company, the goal was to improve the company’s day-to-day operations by introducing innovative digital solutions, a platform that connects the company with its customers, and an analysis of cyber insurance policies to be included in the company’s portfolio. Ref. [4] designed an efficient distributed enameled blockchain platform as a system service to support transaction execution in insurance processes. There are also opportunities for using blockchain technology in medicine, references [29,30] explore blockchain research for healthcare, and present a roadmap for the future. Not only that, but many proposals use blockchain technologies to improve scientific processes [31]. We didn’t work on the blockchain directly, but we created a UML profile to represent it, and after that, we transformed the whole model.
Model transformations [32] or Model to Program (M2P) approach can handle many problems and complete many source models. In our previous paper [33] we presented the theoretical background and an overview of Model to Program in the case of workflow systems. We have discussed various semi-formal transformations from semi-formal models such as UML and BPMN to other formal models such as YAWL and Petri nets or executable programs. The need to obtain validated and well-analyzed programs led many researchers to look into using M2P and other methods. The book [6] contains many papers specialized in M2P. One of them is formal model checking and transformations of models represented in UML using Alloy [34], where we transformed our UML activity diagram model into an Alloy program to benefit from the Alloy analyzer. Another transformation of UML data using Model Driven Architecture [35]. Ref. [36] automatically generates integrated formal models that correspond to UML system models. Also, ref. [37] presented a transformation methodology for UML 2.0 activity diagrams into colored Petri nets. Reference [38] shows a graph transformation of activity diagrams into π - calculus for Verification Purpose. Many other transformations are performed from UML to YAWL, which is considered an extended version of Petri nets and is also considered an alternative to BPEL and has strong verification tools. In our previous work, we transformed the UML state machine to YAWL to enable better verification and analysis of our models [39]. Ref. [40] also transformed the UML activity diagram into YAWL models for Business Processes Analysis.

3. Research Questions in the Context of Information Systems

The blockchain technology and architecture promise that each participant in the transaction has her copy of the ledger to safeguard the consistency and integrity of the logs of transactions through synchronization. Thereby, communicating partners participating in transactions can avoid the utilization of intermediary parties. Business use cases in finance involve back-end processing of transactions and provenance tracing through the whole process chain [41,42]. In an enterprise environment, the tracking, recording, and retention of data representing information flow, actions, activities are very important and legally required, especially in the field of finance. The tracing of activities within workflows is very important from the viewpoint of accounting and the auditing of Information Systems. The application of blockchain technology within workflows raises questions whether how the internal audit function and external auditing acts will change [43,44]. The auditing of Information Systems concentrates not only on financial accounting but all electronic transactions that involve data, electronic documents, and processing steps. The digital transformation of enterprises implies that the major part of each business process is electronic; at certain points, human interactions are involved. In the case of digitally transformed enterprises, especially those that exploit Financial Services Technologies the supply chain management means the flow of electronic documents that contain various information about the transactions. The decisive assets of digitally transformed enterprises are data, information stored in electronic documents, structured, semi-structured, and unstructured formats [45,46]. Blockchain technology makes it possible that the state, the originality, and tracking data of pieces of information can be retrieved that were collected throughout the whole life cycle of the given item. From a document-centric view, the descriptions of Business Processes, Workflows either in XML or JSON can be considered as semi-structured data/document besides the information resources that are utilized during the execution of tasks included in Workflow and Business Processes [47,48]. One of the research questions is how the information flow should be managed as the Supply Chain of electronic pieces of information; how the Information Architecture and Enterprise architecture should look like. What kind of design methods should be applied? [49,50]. In an enterprise that is digitally transformed, Information Systems are core constituents. Blockchain technology is devoted to those applications that share information. The research question is how blockchain technology could be used; what use cases would be appropriate to exploit blockchain technology for efficient and effective application. The Workflows manage the transactions and information resources that are an integral part of Information Systems [51,52]. To define design principles that could be used to describe Workflow, Business Processes, and their tasks to make use of blockchain technology for provenance, security, control, monitor, data protection, and supervising is a research area that can be ordered under the subject of Design Science Research. The Design Science Research paradigm gives a research methodology that can be applied to conceptualize the results of experimental design and development [53]. To elaborate design principles, case studies, models, and patterns of Workflow can be used to start building up initial design guidelines [54]. The next question is if there are design guidelines on how to specify Workflows and Business Processes that are integrated with blockchain technology to provide provenance about the instances of executed tasks of Processes and consumed information items. Furthermore, how we can create executable programs from models that were built in a visual language. The available opportunity is to employ the toolset of Model-to-Program (M-2-P). Besides the operationalization of the specified workflow, the M-2-P techniques offer model checking, maintaining consistency, integrity—coupled with blockchain—security, and trustiness.
Definition 1.
Blockchain is an electronic, decentralized, distributed account book (ledger) that stores all activities promptly to establish an enduring and immutable registry.
Blockchain technology can be used to trace financial transactions (internal and external) to enterprises, tracking the electronic document, data, more generally, assets during workflows and after finishing and closing down the specific issue. The blockchain makes it possible to assure the quality of processes, to support internal and external auditing, management control, and checking. Since the electronic document handling belongs to the information logistics of companies.
The MIT Business Process Handbook contains a comprehensive collection of Business Process patterns that could be customized for purpose [55]. The domain of Finance needs some tailoring of the original patterns, especially in the insurance industry. In the tables (Table 1 and Table 2), the core patterns are outlined that make it obligatory in a digitally transformed enterprise to be complemented by the modern security mechanisms that can safeguard the integrity, consistency, and trustfulness of the business processes. The components of blockchain technology can be inserted into patterns then the patterns can be used during business process realization and finally the executable programs as instances of the business process realization can be generated through the exploitation of the Model-2-Program approach.

Case Studies

This part of the research has been designed as an exploratory multiple case study [56,57]. The empirical inquiry that investigates a contemporary phenomenon in real-life context building should start with little or no theory under consideration and no hypothesis to test as preordained theoretical propositions may limit or bias future research [56,57], therefore this part aimed to act as a starting point to draw up sufficiently broad research questions and future data gathering process.
It has been long argued that blockchain can “democratize” the economy by creating a technological commanding opportunity that favors, open, distributed, decentralized systems, platforms, and markets based on blockchains. When representation of companies’ activities are put on the blockchain, the company enables open and decentralized access to the information flows to managers and allows for centralized control that for sure improves companies operations [58,59,60].
Insurers are at the early stages of discovering the potential of new technologies to improve their operations, so naturally, many insurance companies are studying how they can benefit from the use of blockchain and this is the central goal of many applied and research projects. A few potential domains for the use of blockchain in insurance include:
  • Smart contracts, or better computer protocols, embedding the contractual obligations into a source code that is compiled and executed per terms and conditions specified in the contract. It relies on the distributed ledger architecture of a blockchain to create the smart contract. Therefore the smart contract can control its states and assets, and it can respond to the input of external information. Smart contracts can be fully self-enforcing [61].
  • Customer loss history, estimating the insurance policy quote is based on a complex risk assessment process, in which companies must analyze customer’s loss history, a process that allows the insurance companies to correlate past behavior to risk [62]. This process can be long and painful for all parties involved. Therefore, some first claims sharing platforms, based on blockchain, can provide any company with the opportunity to keep records of claims/losses in one place, in which the credibility of claims is validated by a blockchain technology [63].
  • Regulatory compliance Financial institutions are highly regulated and hierarchical organizations, where multi-stakeholders views usually are required to implement such systems. Regulatory compliance projects can be another example for cases where the application of blockchain may significantly improve operations, and such implementation can lead to big operation improvements in terms of audit issues or possible risks coming from failing to comply with regulation [64].
  • Claims processes A typical claim process starts with an insurer asking to assess the loss or the damage of the insured person or company. Different solutions have been devised already in this respect, in terms of automated claims setting, where already based on past data, the company can fully automatize claim report and their response to them. Insurance companies, therefore, execute and automate decisions to the greatest extent possible, such as whether the insurance company should pay the claim, which is approved by a staff member is later only without the manager’s meddling [65].
Other use can be for the aim of offering digital identities related services for financial companies [66], as well as for improved security as solutions based on blockchain bring transparency [67].
To understand the relevance of use cases from an insurance perspective, we can distinguish three cases categories in respect to the potential they hold from a business point of view to the company [68]:
  • Evolutionary, cases where there already exist solutions, without blockchain, and the stakeholders and markets have solutions, and thus blockchains only optimize existing offer, support, and operations.
  • Transformative, insurance users are served in a new way, in new context, the business operations models are created, and thus this means that insurers add new innovative offerings to their pallet of products and services.
  • Disruptive, cases that lead to the creation of new users and new ways of doing business for the insurers (thus also new business models for insurers and new ways of doing business).
The biggest challenges for implementation relate to the effect on the social and business network. The issue is what is required to make the distributed ledger technology work in the different scenarios. For the specific solutions to work, there needs to be adherence to several institutional regulations. The second challenge is that the literature doesn’t discuss yet is how value creation and value capturing will be realized through these solutions for the companies, this will be, according to many scholars, the next obstacle to solving indeed.

4. Overview of the Insurance Claim Processing

Each claim involves a business process that is to be performed. The process consists of a sequence of tasks that must be performed, and conditions that must be verified to execute the task. An example of a process is the way insurance companies handle claims. Figure 1 shows the activity diagram of the claims handling process. As shown in Figure 1, the added value of the modeling perspective in Activity Diagrams is based on the ability to model and integrate the different components’ view in the claims process, and how to provide a systematic integration of automation, and explains how the systems support the employees in the different phases of the claims process.
These types of views make it possible to:
  • Identify and model claims processes at single organizational layers (transversal and information flow to all managers).
  • Improve the business process by identifying tasks that can be performed in parallel.
  • Model different criteria on organization level of claims accepting/rejection.

4.1. Modeling the Insurance Claim with Activity Diagram

An insurance claim is a formal request from a customer to an insurance company for coverage or indemnification. First, the customer applies for the claim. The insurance company receives the claim after entering the data into the system and reviewing the claim; they decide the policy and claim type if it is premium or economic. The investigation begins after the manager-level responsibility and the clerk-level responsibility. The insurance organization will assess the claim and may request additional data to confirm the case. After that, a conclusion of investigation and analysis which help to determine the value of insurance claims for a d refuted by the customer, settlement through agreement or direct acceptance. After the Acceptance, the insurance organization will calculate the payment transfer and notify the customer by email, SMS, or postal mail. Figure 1 shows in detail the insurance claim/Activity diagram.

4.2. UML Activity Diagram and Petri Nets Meta Models

UML Activity diagram and Petri nets metamodels are needed to define the element-to-element transformation. From the activity diagram meta-model, we use activities, edges, and control nodes to acquire the transformation rules and transform them into Petri nets as shown in the figure below The Figure 2.
We used in our work Petri nets because they are considered to be one of the powerful formal models for work, control and information-flow representation [69]. It helps to make a formal description, modeling, as well as a formal analysis of information systems and business process modeling. Its techniques, properties, and concepts follow a well-balanced combination of powerful, easy-to-use, and self-evident methods to describe and analyze the flow of information and control processes throughout the whole system structure. To transform our model to Petri nets, we need the Petri nets meta-model presented in Figure 3.

4.3. Extending the Activity Diagram including Blockchain UML Profile

We propose to create a structured UML profile, a new meta-model, to lightweight extend the UML meta-model by adding the blockchain part to the Activity diagram. Profiles allow adaptation of the UML meta-model for platforms like Java platform, .NET Framework, etc... or domains such as our case business process modeling, insurance, medical applications, service-oriented architecture, etc.
Figure 4 shows in detail our profile for blockchain. It is composed of:
  • Node—In blockchain architecture, a node can be any user or computer (every node has an independent copy of the blockchain).
  • Block—Ia data structure used for keeping a set of transactions that is distributed to all nodes in the network.
  • Chain—Ia sequence of blocks in a specific order.
  • Transaction—Contained in the block and contains information, records, etc...
  • Miners—specific nodes which perform the block verification process before adding anything to the blockchain structure.

4.4. Transforming the Extended UML with Blockchain to Petri Nets

In the upcoming subsections, we will present the transformation rules element to element from UML AD and the extended part that represents the blockchain to Petri nets and the algorithm of transformation.

4.4.1. Transformation Rules

The transformation rules presented in Table 3 to be used in our transformation algorithm were extracted from comparing the UML activity diagram meta-model (see Figure 2) + the created profile (see Figure 4) with the Petri nets meta-model (see Figure 3). The transformation is done from element to element only when it comes to the workflow: join in the UML activity diagram is transformed into a non-real transition with incoming arcs from the joined places in Petri nets, and fork in the UML activity diagram is transformed into a non-real transition with outgoing arcs from the split transitions.

4.4.2. Transformation Algorithm

For our Algorithm 1, we define first the set of components from both the extended UML-AD and Petri nets.
Definition 2.
The input model of Extended UML-AD
  • N o d e is for initial, Final or decision node.
  • A c t i o n is for action.
  • E d g e is for edge.
  • W o r k f l o w is for join or fork.
  • B l o c k is for added block.
  • D a t a is for added data.
Definition 3.
The output model Petri nets
  • P l a c e is for Place.
  • T r a n s i t i o n is for Transition.
  • A r c is for Arc.
  • T o k e n is for Token.
We initialize the unprocessed elements to all the elements in the input model and then process them one by one through specifying the type of the workflow, whether it is a join or a fork; and even the type of the activity node is defined, whether it is an initial, final, or decision node, and then we pursue the created transformation rules (Table 3) until we complete all elements in the set.
Algorithm 1 Extended UML AD to Petri net Transformation algorithm
Input: an extended UML model ( N o d e , A c t i o n , W o r k f l o w , E d g e , B l o c k , D a t a )
Output: a Petri net ( P l a c e , T r a n s i t i o n , A r c , T o k e n )
Initiation:
p r o c _ e l e m e n t s : = , n o n _ p r o c _ e l e m e n t s = { i i I n p u t } ;
n o d e _ t y p e { I n i t i a l , F i n a l , D e c i s i o n }
w o r k f l o w _ t y p e { J o i n , F o r k }
  • while n o n _ p r o c _ e l e m e n t s 0 do
  •     if  i = N o d e  then
  •         if  n o d e _ t y p e = I n i t i a l or n o d e _ t y p e = F i n a l or n o d e _ t y p e = D e c i s i o n  then
  •             a d d P l a c e O u t p u t ;
  •             a d d i p r o c _ e l e m e n t s ;
  •         end if
  •     end if
  •     if  i = A c t i o n  then
  •          a d d P l a c e O u t p u t ;
  •          a d d i p r o c _ e l e m e n t s
  •     end if
  •     if  i = E d g e  then
  •          a d d T r a n s i t i o n O u t p u t ;
  •          a d d i p r o c _ e l e m e n t s
  •     end if
  •     if  i = W o r k f l o w  then
  •         if  w o r k f l o w _ t y p e = J o i n  then
  •             a d d N o n _ R e a l t r a n s i t i o n O u t p u t ;
  •             a d d I n c o m i n g _ A r c s _ f r o m _ j o i n e d _ P l a c e s O u t p u t ;
  •             a d d i p r o c _ e l e m e n t s
  •         else
  •            if  w o r k f l o w _ t y p e = F o r k  then
  •                 a d d N o n _ R e a l t r a n s i t i o n O u t p u t ;
  •                 a d d O u t g o i n g _ A r c s _ f r o m _ f o r k e d _ P l a c e s O u t p u t ;
  •                 a d d i p r o c _ e l e m e n t s
  •            end if
  •         end if
  •     end if
  •     if  i = E d g e  then
  •          a d d t r a n s i t i o n O u t p u t ;
  •          a d d i p r o c _ e l e m e n t s
  •     end if
  •     if  i = B l o c k  then
  •          a d d P l a c e O u t p u t ;
  •          a d d i p r o c _ e l e m e n t s
  •     end if
  •     if  i = D a t a  then
  •          a d d t o k e n O u t p u t ;
  •          a d d i p r o c _ e l e m e n t s
  •     end if
  • end while

5. Discussion

There is a proposal for theoretical frameworks considering blockchain applications in supply chain and logistics. These proposals raise the question of how to structure and design an architecture for processes of supply chain and logistics [49,70]. The proposed theoretical frameworks concentrate on the Business Model component of the Enterprise Architecture [71,72,73]. There is an attempt to provide design guidelines in the context of the supply chain to achieve provenance. The proposed approach is grounded in an ontology-oriented method [74]. Application of blockchain technologies in Business Processes within an untrusted environment is analyzed in a paper [75]. The application of State Machines to discover process patterns is investigated in ref. [76].
The document handling within Financial Services can be considered as the Information Logistics function of enterprises. Thus, the supply chain and logistics application has relevance for idea generation and thereby tailoring the appropriate sector.
We used two-pronged approaches in our research, namely, real-life case studies and experimental design and development. Based on case studies, Business Process Models are described in UML Activity Diagrams, in which the Business Process representation is grounded in patterns. The patterns are extended by hooks that will use blockchain technologies for two purposes. One is to track the specific instance of the Business Process. The other one is to trace the documents, evidence, and input/output data during processing. The reason that we applied Activity Diagrams in UML and SysML is that their application is widespread and easy to understand and explain in contrast to BPMN 2.0 [3,77]. The configuration of possible components and patterns provides an approach that is feasible to support Business Process Management and Modeling in the Finance domain. The constrained experiment showed that it is viable to elaborate the Business Processes and blockchain patterns in a systematic way for the Finance domain. The pairing of business processes and blockchain models through a pattern-based approach is a fruitful solution in the cases when financial companies in their digital transformation, intensively use blockchain-related technologies in various fields of business activities. The initial models rely on the Business Processes that were explored in the case studies. This model contains starting patterns that will be extended by empirical studies and software experiments [54]. The empirical observation of case studies served as the basis for conceptualizing the patterns from which the Business Process Representation in UML Activity Diagrams were created. During the modeling, the BPMN principles are followed in a disciplined way that relies on existing patterns. The patterns are extended by such links to blockchain services that enable program generation from the individual models. The M-2-P approach gives a solid base for program generation from Business Process Models. The algorithms that were developed up to now need enhancement using graph-theoretical foundations to be prepared for the complex situation and model configurations. We attempted to apply the M-2-P methodology in the field of Financial Services and workflows. Other authors aimed at distinct fields for the application of M-2-P and they did not consider involving the blockchain technology into M-2-P methodology [7]. The M-2-P, BPMN, Activity Diagram representation in graph format, and the transformation based on graph theory are justified modeling approaches in the problem domain. The combination of proposed models is useful to support financial companies to react to stimuli and events that arrive from the turbulent environment, market. We used experimental design, development, and implementation to investigate the results of model building and program generation. The qualitative case studies gave enough information to investigate phenomena in the problem area. The M-2-P method made it possible to observe and investigate the designed model in an operational environment. The experimental design and development along with the usage of empirical data have proved a beneficial methodology to study and to create proposals for solutions in the problem area. Our design is based on real-life case studies that yielded foundations to study the proposed approach. The pattern library that is already existing and will be developed can support the digitalization of Financial Companies and the dynamic process changes in an Agile and Lean governance environment.
Practitioners can benefit from this study too. First on a more general level, to our knowledge we are the first to apply the M-2-P methodology in the financial domain and workflows and involved blockchain technology into M-2-P methodology. This generic setting can: (i) help in developing activities for such technology setting and, (ii) decrease the transparency problems in the insurance claim process.

6. Conclusions

The business activities and document processing of the insurance field can be regarded as a specialization of more generic business and document-related processes within Finance and Financial Services. The sector-specific business processes can be abstracted away and formulated as generic processes that can be considered as a valid generalization for the whole Finance sector. The disciplined case study methodology makes it possible to observe the phenomena in a specific case and then generalize it. In Financial Services, the initiation of an issue, inputting documents, creating new documents, processing them are typical components of a workflow. During the document processing, the document flow starts with documents that are full of free, unbounded variables and placeholders. During the processing, the variables will be bound and valuated until they reach a finalized state. However, the finalized state is not the end-state, since the business processes may require further modifications to reach the end-state in the form of a ground document [78]. The recent and hot issue of transparency in every field of business transactions requires that during the entire processing, all activities could be explainable and understandable. The valuation of variables in the documents happens through the execution of algorithms including Data Science, and in a broad sense AI. The newer versions of the specific algorithms in AI and Data Science attempt to give cues about the proposed decision. However, these cues and final results should be integrated into the activities of business processes. Defining the adequate patterns that incorporate the appropriate services that manage both the blockchain technology for immutability and the explanation of the actual results of the valuated variables that will be expounded as a decision or outcome is the crucial question. The case study assisted to pinpoint the issue and the proposed approach, and thereby it makes it possible to conclude general statements exploiting the underlying generic enterprise architecture that are similar or quasi-isomorphic concerning the graph representation to other typical workflows and business processes in Financial Services. For this reason, the generalization and unification based on one specific sector of Finance can be performed to achieve a valid conclusion. This paper discusses the power of modeling business processes using UML activity diagrams and other languages presented in the literature, and model transformation M2P benefits from the strength of blockchain and UML profiles to facilitate insurance claims. A UML profile was created to extend the UML activity diagram by adding a part that represents the blockchain. Then we Transformed the whole extended diagram to Petri nets by respecting the generated rules of transformation.
Implications of our paper suggest that blockchain integration in the insurance field can be a promising multi-actor research area. To our knowledge, it is the first paper to discuss the modeling of the blockchain-based insurance claim process.
In the future, the model that was presented in this article is a starting point for research in which we systematically seek and collect patterns of Business Processes that are specific to Finance and especially to Financial Services Technologies. The referred sources that contain generic descriptions and patterns of Business Processes are not tailored to the domain of Finance. The application of blockchain technology can be perceived as web services or micro-services that are called by tasks of specific Business Processes [55]. These web service patterns should be explored and defined, then patterns should be collected into the library. The patterns of Business Processes and web services initiate the review of workflow patterns [54]. The workflow patterns are elementary building blocks that can be either extended or expanded by necessary constituents to take into account the specialty of Business Processes in Financial Services Technologies and the application of blockchain technologies. This collection of patterns – Business Processes and workflows – can be used to develop a set of adaptive algorithms that make it possible to use the Model-2-Program paradigm in a complex and rapidly changing enterprise environment to react to stimuli from outside.

Author Contributions

G.P., B.M. and M.K. worked on the conceptualization of the raised issue; they wrote the original draft version, then they carried out the editing and revision. G.P., B.M. and M.K. proofread the draft and revision. B.M. supervised the process. M.K. and B.M. acquired funding to support the creation of the paper. All authors have read and agreed to the published version of the manuscript.

Funding

“Application Domain-Specific Highly Reliable IT Solutions” project that has been implemented with the support provided from the National Research, Development and Innovation Fund of Hungary, financed under the Thematic Excellence Programme TKP2020-NKA-06 (National Challenges Subprogramme) funding scheme. https://nkfih.gov.hu/palyazoknak/tkp-2020, accessed on 20 December 2021.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data and code presented in this study are available on request from the authors.

Acknowledgments

The project was supported by the “Application Domain-Specific Highly Reliable IT Solutions" project that has been implemented with the support provided by the National Research, Development and Innovation Fund of Hungary, financed under the Thematic Excellence Programme TKP2020-NKA-06 (National Challenges Subprogramme) funding scheme. Furthermore, this article is partly based upon work from COST Action ‘CA19130—Fintech and Artificial Intelligence in Finance—Towards a transparent financial industry’, supported by COST (European Cooperation in Science and Technology), https://www.cost.eu/actions/CA19130/, accessed on accessed on 20 December 2021.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ISInformation System
ITInformation Technology
IT/ISInformation Technology and Information System
ERPEnterprise Resource Planning System
ITILInformation Technology Infrastructure Library
TOGAFThe Open Group Architecture Framework
XMLExtensible Markup Language
JSONJavaScript Object Notation
DBMSDatabase Management System
M2PModel-to-Program method for system generation
SysMLThe Object Management Group’s OMG SysML is a general-purpose
graphical modeling language for representing systems that may include
combinations of hardware and equipment, software,
data, people, facilities, and natural objects
BPMN 2.0Business Process Modelling Notation (OMG)

References

  1. Alotaibi, Y. Business process modelling challenges and solutions: A literature review. J. Intell. Manuf. 2016, 27, 701–723. [Google Scholar] [CrossRef]
  2. Holt, J. SysML for Systems Engineering: A Model-Based Approach; Institution of Engineering and Technology: Stevenage, UK, 2018. [Google Scholar]
  3. Geambaşu, C.V. BPMN vs. UML activity diagram for business process modeling. Acc. Manag. Inf. Syst. 2012, 11, 637–651. [Google Scholar]
  4. Raikwar, M.; Mazumdar, S.; Ruj, S.; Gupta, S.S.; Chattopadhyay, A.; Lam, K.Y. A blockchain framework for insurance processes. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; pp. 1–4. [Google Scholar]
  5. Pisoni, G. Going digital: Case study of an Italian insurance company. J. Bus. Strat. 2020, 42, 106–115. [Google Scholar] [CrossRef]
  6. Dahanayake, A.; Pastor, O.; Thalheim, B. Modelling to Program: Second International Workshop, M2P 2020, Lappeenranta, Finland, 10–12 March 2020, Revised Selected Papers; Springer: Berlin, Germany, 2021; Volume 1401. [Google Scholar]
  7. Thalheim, B. From Models_For_Programming to Modelling_To_Program and Towards Models_As_A_Program. In Modelling to Program; Springer: Berlin, Germany, 2021; pp. 3–44. [Google Scholar] [CrossRef]
  8. Sendall, S.; Kozaczynski, W. Model transformation: The heart and soul of model-driven software development. IEEE Softw. 2003, 20, 42–45. [Google Scholar] [CrossRef]
  9. Lyazidi, A.; Mouline, S. Formal verification of UML state machine diagrams using Petri nets. In Networked Systems; Springer: Berlin, Germany, 2019; pp. 67–74. [Google Scholar]
  10. Scholz-Reiter, B.; Stickel, E. Business Process Modelling; Springer: Berlin, Germany, 2012. [Google Scholar]
  11. Medoh, C.; Telukdarie, A. Business process modelling tool selection: A review. In Proceedings of the 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Singapore, 10–13 December 2017; pp. 524–528. [Google Scholar]
  12. Rodríguez, A.; Fernández-Medina, E.; Trujillo, J.; Piattini, M. Secure business process model specification through a UML 2.0 activity diagram profile. Decis. Supp. Syst. 2011, 51, 446–465. [Google Scholar] [CrossRef]
  13. Rittgen, P. Enterprise Modeling and Computing with UML; IGI Global: Hershey, PA, USA, 2006. [Google Scholar]
  14. Girault, C.; Valk, R. Petri Nets for Systems Engineering: A Guide to Modeling, Verification, and Applications; Springer: Berlin, Germany, 2013. [Google Scholar]
  15. Campos, J.; Merseguer, J. On the integration of UML and Petri nets in software development. In Proceedings of the International Conference on Application and Theory of Petri Nets, Turku, Finland, 26–30 June 2006; pp. 19–36. [Google Scholar]
  16. Grobelna, I.; Wiśniewski, R.; Grobelny, M.; Wiśniewska, M. Design and verification of real-life processes with application of Petri nets. IEEE Trans. Sys. Man Cybern. Syst. 2016, 47, 2856–2869. [Google Scholar] [CrossRef]
  17. Dijkman, R.M.; Dumas, M.; Ouyang, C. Semantics and analysis of business process models in BPMN. Inf. Soft. Technol. 2008, 50, 1281–1294. [Google Scholar] [CrossRef] [Green Version]
  18. Huang, E.; McGinnis, L.F.; Mitchell, S.W. Verifying SysML activity diagrams using formal transformation to Petri nets. Syst. Eng. 2020, 23, 118–135. [Google Scholar] [CrossRef]
  19. Eshuis, R.; Wieringa, R. Comparing Petri net and activity diagram variants for workflow modelling—A quest for reactive Petri nets. In Petri Net Technology for Communication-Based Systems; Springer: Berlin, Germany, 2003; pp. 321–351. [Google Scholar]
  20. Swan, M. Blockchain: Blueprint for a New Economy; O’Reilly Media, Inc.: Newton, MA, USA, 2015. [Google Scholar]
  21. Nofer, M.; Gomber, P.; Hinz, O.; Schiereck, D. Blockchain. Bus. Inf. Syst. Eng. 2017, 59, 183–187. [Google Scholar] [CrossRef]
  22. Sharples, M.; Domingue, J. The blockchain and kudos: A distributed system for educational record, reputation and reward. In Proceedings of the European Conference on Technology Enhanced Learning, Lyon, France, 13–16 September 2016; pp. 490–496. [Google Scholar]
  23. Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
  24. Kar, A.K.; Navin, L. Diffusion of blockchain in insurance industry: An analysis through the review of academic and trade literature. Telemat. Inform. 2020, 58, 101532. [Google Scholar] [CrossRef]
  25. Chen, W.; Xu, Z.; Shi, S.; Zhao, Y.; Zhao, J. A survey of blockchain applications in different domains. In Proceedings of the 2018 International Conference on Blockchain Technology and Application, Xi’an, China, 10–12 December 2018; pp. 17–21. [Google Scholar]
  26. Treleaven, P.; Brown, R.G.; Yang, D. Blockchain technology in finance. Computer 2017, 50, 14–17. [Google Scholar] [CrossRef]
  27. Tapscott, A.; Tapscott, D. How blockchain is changing finance. Harv. Bus. Rev. 2017, 1, 2–5. [Google Scholar]
  28. Varma, J.R. Blockchain in finance. Vikalpa 2019, 44, 1–11. [Google Scholar] [CrossRef] [Green Version]
  29. Radanović, I.; Likić, R. Opportunities for use of blockchain technology in medicine. Appl. Health Econ. Health Policy 2018, 16, 583–590. [Google Scholar] [CrossRef]
  30. Kassab, M.H.; DeFranco, J.; Malas, T.; Laplante, P.; Neto, V.V.G. Exploring Research in Blockchain for Healthcare and a Roadmap for the Future. IEEE Trans. Emerg. Top. Comput. 2019, 9, 1835–1852. [Google Scholar] [CrossRef] [Green Version]
  31. Vivekanadam, B. Analysis of recent trend and applications in block chain technology. J. ISMAC 2020, 2, 200–206. [Google Scholar] [CrossRef]
  32. Bézivin, J.; Büttner, F.; Gogolla, M.; Jouault, F.; Kurtev, I.; Lindow, A. Model transformations? Transformation models! In Proceedings of the International Conference on Model Driven Engineering Languages and Systems, Genova, Italy, 1–6 October 2006; pp. 440–453. [Google Scholar]
  33. Kherbouche, M.; Molnár, B. Modelling to Program in the Case of Workflow Systems Theoretical Background and Literature Review. In Proceedings of the 13th Joint Conference on Mathematics and Informatics, Budapest, Hungary, 1–3 October 2020. [Google Scholar]
  34. Kherbouche, M.; Molnár, B. Formal Model Checking and Transformations of Models Represented in UML with Alloy. In International Workshop on Modelling to Program; Springer: New York, NY, USA, 2020; pp. 127–136. [Google Scholar]
  35. Deeba, F.; Kun, S.; Shaikh, M.; Dharejo, F.A.; Hayat, S.; Suwansrikham, P. Data transformation of UML diagram by using model driven architecture. In Proceedings of the 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), Chengdu, China, 20–22 April 2018; pp. 300–303. [Google Scholar]
  36. Treharne, H.; Turner, E.; Paige, R.F.; Kolovos, D.S. Automatic generation of integrated formal models corresponding to UML system models. In Proceedings of the International Conference on Objects, Components, Models and Patterns, Zurich, Switzerland, 29 June–3 July 2009; pp. 357–367. [Google Scholar]
  37. Farooq, U.; Lam, C.P.; Li, H. Transformation methodology for UML 2.0 activity diagram into colored Petri nets. In Proceedings of the Third Conference on IASTED International Conference: Advances in Computer Science and Technology, Phuket, Thailand, 2–4 April 2007; pp. 128–133. [Google Scholar]
  38. Belghiat, A.; Chaoui, A. A Graph Transformation of Activity Diagrams into π-calculus for Verification Purpose. In Proceedings of the 3rd International Conference on Advanced Aspects of Software Engineering, Constantine, Algeria, 1–2 December 2018; pp. 107–114. [Google Scholar]
  39. Kherbouche, M.; Bouafia, K.; Molnár, B. Transformation of UML State Machine To YAWL. In Proceedings of the 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS), Cairo, Egypt, 8–10 December 2019; pp. 215–220. [Google Scholar]
  40. Belghiat, A.; Oukhaf, D.; Chaoui, A. Transforming UML Diagrams to YAWL Models for Business Processes Analysis. In Proceedings of the International Symposium on Modelling and Implementation of Complex Systems, Batna, Algeria, 24–26 October 2020; pp. 279–293. [Google Scholar]
  41. Zhao, J.; Simmhan, Y.; Prasanna, V. On Presenting Apropos Provenance for Situation Awareness and Data Forensics. In Proceedings of the 4th international conference on Provenance and Annotation of Data and Processes, Santa Barbara, CA, USA, 19–21 June 2012. [Google Scholar] [CrossRef] [Green Version]
  42. Sultana, S.; Bertino, E. A Comprehensive Model for Provenance. In Proceedings of the 4th international conference on Provenance and Annotation of Data and Processes, Santa Barbara, CA, USA, 19–21 June 2012. [Google Scholar] [CrossRef]
  43. Coyne, J.G.; McMickle, P.L. Can Blockchains Serve an Accounting Purpose? J. Emerg. Technol. Acc. 2017, 14, 101–111. [Google Scholar] [CrossRef]
  44. Dai, J.; Vasarhelyi, M.A. Toward Blockchain-Based Accounting and Assurance. J. Inf. Syst. 2017, 31, 5–21. [Google Scholar] [CrossRef]
  45. Molnár, B.; Pisoni, G.; Tarcsi, Á. Data Lakes for Insurance Industry: Exploring Challenges and Opportunities for Customer Behaviour Analytics, Risk Assessment, and Industry Adoption. ICETE 2020, 3, 127–134. [Google Scholar]
  46. Pisoni, G.; Molnár, B.; Tarcsi, Á. Data Science for Finance: Best-Suited Methods and Enterprise Architectures. Appl. Syst. Innov. 2021, 4, 69. [Google Scholar] [CrossRef]
  47. Molnár, B.; Benczúr, A.; Béleczki, A. A Model for Analysis and Design of Information Systems based on a Document Centric Approach. In Intelligent Information and Database Systems IIDS; Springer: Berlin, Germany, 2016; pp. 290–299. [Google Scholar]
  48. Marini, J. Document Object Model: Processing Structured Documents; McGraw-Hill/Osborne: New York, NY, USA, 2002. [Google Scholar]
  49. Treiblmaier, H. The impact of the blockchain on the supply chain: A theory-based research framework and a call for action. Supp. Chain Manag. 2018, 23, 545–559. [Google Scholar] [CrossRef] [Green Version]
  50. Xu, X.; Weber, I.; Staples, M.; Zhu, L.; Bosch, J.; Bass, L.; Pautasso, C.; Rimba, P. A Taxonomy of Blockchain-Based Systems for Architecture Design. In Proceedings of the 2017 IEEE International Conference on Software Architecture (ICSA), Gothenburg, Sweden, 3–7 April 2017. [Google Scholar] [CrossRef]
  51. Clohessy, T.; Acton, T.; Rogers, N. Blockchain adoption: Technological, organisational and environmental considerations. In Business Transformation Through Blockchain; Springer: Berlin, Germany, 2019; pp. 47–76. [Google Scholar]
  52. Lacity, M.C. Addressing key challenges to making enterprise blockchain applications a reality. MIS Quart. Exec. 2018, 17, 201–222. [Google Scholar]
  53. Hevner, A.; Chatterjee, S. Design Research in Information Systems; Springer: New York, NY, USA, 2010. [Google Scholar] [CrossRef]
  54. Russell, N.; van der Aalst, W.M.P.; ter Hofstede, A.H. Workflow Patterns; MIT Press Ltd.: Cambridge, MA, USA, 2016. [Google Scholar]
  55. Malone, T.W.; Crowston, K.; Herman, G.A. Organizing Business Knowledge: The MIT Process Handbook; The MIT Press: Cambridge, MA, USA, 2003. [Google Scholar]
  56. Yin, R.K. Case Study Research: Design and Methods; Sage: Newcastle upon Tyne, UK, 2009; Volume 5. [Google Scholar]
  57. Eisenhardt, K.M.; Graebner, M.E. Theory building from cases: Opportunities and challenges. Acad. Manag. J. 2007, 50, 25–32. [Google Scholar] [CrossRef]
  58. Treiblmaier, H.; Umlauff, U. Blockchain and the future of work: A self-determination theory approach. In Blockchain Economics: Implications of Distributed Ledger Technology; WSPC: Singapore, 2019; pp. 105–124. [Google Scholar] [CrossRef]
  59. Chen, Y. Blockchain tokens and the potential democratization of entrepreneurship and innovation. Bus. Horiz. 2018, 61, 567–575. [Google Scholar] [CrossRef]
  60. Chen, Y.; Li, Y.; Li, C. Electronic agriculture, blockchain and digital agricultural democratization: Origin, theory and application. J. Clean. Prod. 2020, 268, 122071. [Google Scholar] [CrossRef]
  61. Datoo, A. The Smart Journey–From Contract Hype to Insurance Reality. In The InsurTech Book: The Insurance Technology Handbook for Investors, Entrepreneurs and FinTech Visionaries; Wiley: Hoboken, NJ, USA, 2018; pp. 240–243. [Google Scholar]
  62. Boobier, T. Analytics for Insurance: The Real Business of Big Data; John Wiley & Sons: Hoboken, NJ, USA, 2016. [Google Scholar]
  63. Stoncius, L. Why Claims Sharing? Innovating within the Business-to-Business Insurance Claims Handling Ecosystem. In The InsurTech Book: The Insurance Technology Handbook for Investors, Entrepreneurs and FinTech Visionaries; Wiley: Hoboken, NJ, USA, 2018; pp. 179–181. [Google Scholar]
  64. Thomas, D. Blockchain as a Backbone to Asset and Wealth Creation. In The WealthTech Book: The FinTech Handbook for Investors, Entrepreneurs and Finance Visionaries; Wiley: Hoboken, NJ, USA, 2018; pp. 170–172. [Google Scholar]
  65. Minelli, M.; Chambers, M.; Dhiraj, A. Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today’s Businesses; John Wiley & Sons: Hoboken, NJ, USA, 2013; Volume 578. [Google Scholar]
  66. Pisoni, G.; Molnár, B.; Tarcsi, Á. Comparison of two technologies for digital payments: Challenges and future directions. In International Conference on Remote Engineering and Virtual Instrumentation; Springer: Cham, Switzerland, 2021; pp. 478–484. [Google Scholar]
  67. Lootsma, Y. Blockchain as the newest regtech application—The opportunity to reduce the burden of kyc for financial institutions. Bank. Financ. Serv. Policy Rep. 2017, 36, 16–21. [Google Scholar]
  68. Hartenstein, M.; Gutmannsbauer, W.; Klee, D.; Przewloka, A.; Arn, S.; Kubli, A.; Lange, V.; Stephens, P. Use Cases and Monetization Challenges of Blockchain Applications in Wealth Management. In The WealthTech Book: The FinTech Handbook for Investors, Entrepreneurs and Finance Visionaries; Wiley: Hoboken, NJ, USA, 2018; pp. 166–169. [Google Scholar]
  69. Petri, C. Kommunikation mit Automaten. Ph.D. Thesis, Institut für Instrumentelle Mathematik, Bonn, Germany, 1962. [Google Scholar]
  70. Weking, J.; Mandalenakis, M.; Hein, A.; Hermes, S.; Böhm, M.; Krcmar, H. The impact of blockchain technology on business models—A taxonomy and archetypal patterns. Electron. Mark. 2019, 30, 285–305. [Google Scholar] [CrossRef] [Green Version]
  71. Zachman, J.A. A Framework for Information Systems Architecture. IBM Syst. J. 1987, 26, 276–292. [Google Scholar] [CrossRef]
  72. Josey, A. TOGAF® Version 9.1–A Pocket Guide; Van Haren: Amsterdam, The Netherlands, 2016. [Google Scholar]
  73. Ori, D.; Molnár, B. A Hypergraph Based Formal Description Technique For Enterprise Architecture Representation. In Proceedings of the 2018 7th International Congress on Advanced Applied Informatics (IIAI-AAI), Yonago, Japan, 8–12 July 2018; pp. 799–804. [Google Scholar]
  74. Kim, H.M.; Laskowski, M. Toward an ontology-driven blockchain design for supply-chain provenance. Intell. Syst. Acc. Financ. Manag. 2018, 25, 18–27. [Google Scholar] [CrossRef]
  75. Weber, I.; Xu, X.; Riveret, R.; Governatori, G.; Ponomarev, A.; Mendling, J. Untrusted Business Process Monitoring and Execution Using Blockchain. In Lecture Notes in Computer Science; Springer: Berlin, Germany, 2016; pp. 329–347. [Google Scholar] [CrossRef]
  76. Van Eck, M.L.; Sidorova, N.; van der Aalst, W.M.P. Discovering and Exploring State-Based Models for Multi-perspective Processes. In Lecture Notes in Computer Science; Springer: Berlin, Germany, 2016; pp. 142–157. [Google Scholar] [CrossRef] [Green Version]
  77. Hause, M. The SysML modelling language. In Proceedings of the Fifteenth European Systems Engineering Conference, Heraklion, Greece, 27–30 April 2006; Volume 9, pp. 1–12. [Google Scholar]
  78. Molnár, B.; Benczúr, A. Issues of Modeling Web Information Systems Proposal for a Document-centric Approach. Proc. Technol. 2013, 9, 340–350. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Insurance claim/Activity diagram.
Figure 1. Insurance claim/Activity diagram.
Asi 05 00010 g001
Figure 2. Activity diagram meta-model. The ’*’, wildcard, means 0...n cardinality.
Figure 2. Activity diagram meta-model. The ’*’, wildcard, means 0...n cardinality.
Asi 05 00010 g002
Figure 3. Petri nets meta-model. The ’*’, wildcard, means 0...n cardinality.
Figure 3. Petri nets meta-model. The ’*’, wildcard, means 0...n cardinality.
Asi 05 00010 g003
Figure 4. A UML profile for blockchain.
Figure 4. A UML profile for blockchain.
Asi 05 00010 g004
Table 1. Business Process Pattern: Claim.
Table 1. Business Process Pattern: Claim.
Request/Claim Pattern
Description
  • The process pattern represents the tasks from the initiation of the claim until the fulfillment or rejection.
  • Verification sub-task begins after the request, an insurance claim has been received, and then accepted by the administrator.
  • The claim, the request is forwarded to the responsible person this task can be described by ‘Connection Pattern’.
  • The verification stage includes authentication, identification, and validation of all data that are supplied by the consumer.
  • The outcome of the verification stage could be approval, rejection, withdrawal of the claim, or refreshing the information.
GoalTo describe a series of tasks in a model that depicts the approval or rejection of the claim.
ProblemThis pattern obligates that verification and validation should be carried out at the starting of the process and during the execution when various confidential and personal information is utilized thereby appropriate security mechanisms should be applied (e.g., blockchain).
Table 2. Business Process Pattern: Contacting patterns.
Table 2. Business Process Pattern: Contacting patterns.
Contacting Partners Pattern
DescriptionTo contact corresponding partners, this pattern represents the chain of tasks whereby more data could be asked for; or inquires can be initiated about the status of the whole process and belonging documents that are addressed to the responsible role. The contacting process can commence with a direct request for information (e.g., claim acceptance, the satisfaction of demand/request, reimbursement) or an offer. The Contacting Partners pattern describes a two-way interaction between the interested parties. The pattern usually starts with the verification of supplied data and requests. The Informing Pattern responds to the request with appropriate messages.
GoalTo model the chain of activities of the Contacting Partners’ pattern.
ProblemContacting Partners’pattern assumes an external stimulus to launch a chain of tasks of the business process. The pre-condition for executing activities within the pattern is to validate the input data and information before starting the whole process. Each task in each process may require identification, authentication, authorization, verification, and validation of information.
Table 3. Transformations rules from UML AD to Petri nets.
Table 3. Transformations rules from UML AD to Petri nets.
Transformation Rules from UML AD to Petri Nets
Rule 1The initial node from UML AD is transformed into a place in Petri nets and the name of the place is the same as the initial node.
Rule 2The final node from UML AD is transformed into a place in Petri nets and the name of the place is the same as the final node.
Rule 3Every action node from the UML activity diagram is transformed to a new place in Petri nets.
Rule 4Every decision node from the UML activity diagram is transformed to a new place in Petri nets, and the name of the place has the same name as the decision.
Rule 5Edges in the UML activity diagram are transformed into new transitions in Petri nets.
Rule 6Join (And Join workflow) in UML activity diagram is transformed to a non-real transition with incoming arcs from the joined places in Petri nets.
Rule 7Fork(And Fork workflow) in the UML activity diagram is transformed to a non-real transition with outgoing arcs from the places split.
Rule 8Every block added by the UML profile is transformed into a place in Petri nets.
Rule 9Data contained in blocks added by the UML profile is transformed into tokens/resources in Petri nets.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kherbouche, M.; Pisoni, G.; Molnár, B. Model to Program and Blockchain Approaches for Business Processes and Workflows in Finance. Appl. Syst. Innov. 2022, 5, 10. https://doi.org/10.3390/asi5010010

AMA Style

Kherbouche M, Pisoni G, Molnár B. Model to Program and Blockchain Approaches for Business Processes and Workflows in Finance. Applied System Innovation. 2022; 5(1):10. https://doi.org/10.3390/asi5010010

Chicago/Turabian Style

Kherbouche, Meriem, Galena Pisoni, and Bálint Molnár. 2022. "Model to Program and Blockchain Approaches for Business Processes and Workflows in Finance" Applied System Innovation 5, no. 1: 10. https://doi.org/10.3390/asi5010010

Article Metrics

Back to TopTop