Process mining

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

Lua error in package.lua at line 80: module 'strict' not found.

Process mining is a process management technique that allows for the analysis of business processes based on event logs. The basic idea is to extract knowledge from event logs recorded by an information system. Process mining aims at improving this by providing techniques and tools for discovering process, control, data, organizational, and social structures from event logs.[1] This is also known in the industry as Automated Business Process Discovery (ABPD)[2]

Overview

Process mining techniques are often used when no formal description of the process can be obtained by other approaches, or when the quality of an existing documentation is questionable. For example, the audit trails of a workflow management system, the transaction logs of an enterprise resource planning system, and the electronic patient records in a hospital can be used to discover models describing processes, organizations, and products. Moreover, such event logs can also be used to compare event logs with some prior model to see whether the observed reality conforms to some prescriptive or descriptive model.

Contemporary management trends such as BAM (Business Activity Monitoring), BOM (Business Operations Management), BPI (business process intelligence) illustrate the interest in supporting the diagnosis functionality in the context of Business Process Management technology (e.g., Workflow Management Systems but also other process-aware information systems).

Application

Process mining follows the options known from business process engineering and goes beyond with feedback to business process modeling:[3]

  • process analysis filters, orders and compresses logfiles for further insight into the connex of process operations.
  • process design may be supported by feedback from process monitoring, which means basically action or event logging
  • process enactment uses results from process mining based on logging for triggering further process operation

Classification

There are three classes of process mining techniques. This classification is based on whether there is a prior model and, if so, how it is used.

  • Discovery: There is no a priori model, i.e., based on an event log some model is constructed a process model can be discovered based on low-level events. For example, using the alpha algorithm, which is a didactically driven approach, where the authors state the lack of analytic capability for large event data volumes with such simple method.[4] There exist many techniques to automatically construct process models (e.g., in terms of a Petri net or a pi-calculus[5][better source needed] expression) based on some event log.[4][6][7][8][9] Recently, process mining research also started to target the other perspectives (e.g., data, resources, time, etc.). For example, the technique described in (Aalst, Reijers, & Song, 2005)[10] can be used to construct a social network.
  • Conformance analysis: There is an a priori model. This model is compared with the event log and discrepancies between the log and the model are analyzed. For example, there may be a process model indicating that purchase orders of more than 1 million euro require two checks. Another example is the checking of the so-called “four-eyes” principle. Conformance checking may be used to detect deviations to enrich the model. An example is the extension of a process model with performance data, i.e., some a priori process model is used to project the bottlenecks on. Another example is the decision miner described in (Rozinat & Aalst, 2006b)[11] which takes an a priori process model and analyzes every choice in the process model. For each choice the event log is consulted to see which information is typically available the moment the choice is made. Then classical data mining techniques are used to see which data elements influence the choice. As a result, a decision tree is generated for each choice in the process.
  • Extension: There is a prior model also. This model is extended with a new aspect or perspective, i.e., the goal is not to check conformance but to enrich the model. An example is the extension of a process model with performance data, i.e., some prior process model dynamically annotated with performance data (e.g., bottlenecks are shown by coloring parts of the process model).

See the book Process Mining: Discovery, Conformance and Enhancement of Business Processes by Wil van der Aalst for details.

Software for process mining

A software framework for the evaluation of process mining algorithms has been developed at the Eindhoven University of Technology by Wil van der Aalst and others, and is available as an open source toolkit.

  • Process Mining[12]
  • ProM Framework[13]
  • ProM Import Framework[14]

Process Mining functionality is also offered by the following commercial vendors:

  • Interstage Automated Process Discovery,[15] a Process Mining service offered by Fujitsu, Ltd. as part of the Interstage Integration Middleware Suite.
  • Disco[16] is a complete process mining software by Fluxicon.[17]
  • ARIS Process Performance Manager,[18] a Process Mining and Process Intelligence Tool offered by Software AG as part of the Process Intelligence Solution.
  • QPR ProcessAnalyzer,[19] a tool for Automated Business Process Discovery, and QPR ProcessAnalysis,[20] a service based on the aforementioned, offered by QPR Software Plc.
  • Perceptive Process Mining,[21] the Process Mining solution by Perceptive Software (formerly Futura Reflect / Pallas Athena Reflect).
  • Celonis Process Mining,[22] the Process Mining solution offered by Celonis
  • SNP Business Process Analysis,[23] the SAP-focused Process Mining solution by SNP Schneider-Neureither & Partner AG
  • minit[24] is a modern Process Mining software offered by Gradient ECM
  • ZDLC and SMART Process Discovery[25]
  • myInvenio,[26] cloud and on-premises solution by Cognitive Technology Ltd.

See also

References

<templatestyles src="Reflist/styles.css" />

Cite error: Invalid <references> tag; parameter "group" is allowed only.

Use <references />, or <references group="..." />

Further reading

  • Aalst, W. van der (2011). Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer Verlag, Berlin (ISBN 978-3-642-19344-6).
  • Aalst, W. van der, Dongen, B. van, Herbst, J., Maruster, L., Schimm, G., & Weijters, A. (2003). Workflow Mining: A Survey of Issues and Approaches. Data and Knowledge Engineering, 47 (2), 237–267.
  • Aalst, W. van der, Reijers, H., & Song, M. (2005). Discovering Social Networks from Event Logs. Computer Supported Cooperative work, 14 (6), 549–593.
  • Jans, M., van der Werf, J.M., Lybaert, N., Vanhoof, K. (2011) A business process mining application for internal transaction fraud mitigation, Expert Systems with Applications, 38 (10), 13351–13359
  • Dongen, B. van, Medeiros, A., Verbeek, H., Weijters, A., & Aalst, W. van der (2005). The ProM framework: A New Era in Process Mining Tool Support. In G. Ciardo & P. Darondeau (Eds.), Application and Theory of Petri Nets 2005 (Vol. 3536, pp. 444–454). Springer-Verlag, Berlin.
  • Dumas, M., Aalst, W. van der, & Hofstede, A. ter (2005). Process-Aware Information Systems: Bridging People and Software through Process Technology. Wiley & Sons.
  • Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., & Shan, M. (2004). Business Process Intelligence. Computers in Industry, 53 (3), 321–343.
  • Grigori, D., Casati, F., Dayal, U., & Shan, M. (2001). Improving Business Process Quality through Exception Understanding, Prediction, and Prevention. In P. Apers, P. Atzeni, S. Ceri, S. Paraboschi, K. Ramamohanarao, & R. Snodgrass (Eds.), Proceedings of 27th international conference on Very Large Data Bases (VLDB’01) (pp. 159–168). Morgan Kaufmann.
  • IDS Scheer. (2002). ARIS Process Performance Manager (ARIS PPM): Measure, Analyze and Optimize Your Business Process Performance (whitepaper).
  • Ingvaldsen, J.E., & J.A. Gulla. (2006). Model Based Business Process Mining. Journal of Information Systems Management, Vol. 23, No. 1, Special Issue on Business Intelligence, Auerbach Publications
  • zur Muehlen, M. (2004). Workflow-based Process Controlling: Foundation, Design and Application of workflow-driven Process Information Systems. Logos, Berlin.
  • zur Muehlen, M., & Rosemann, M. (2000). Workflow-based Process Monitoring and Controlling – Technical and Organizational Issues. In R. Sprague (Ed.), Proceedings of the 33rd Hawaii international conference on system science (HICSS-33) (pp. 1–10). IEEE Computer Society Press, Los Alamitos, California.
  • Rozinat, A., & Aalst, W. van der (2006b). Decision Mining in ProM. In S. Dustdar, J. Faideiro, & A. Sheth (Eds.), International Conference on Business Process Management (BPM 2006) (Vol. 4102, pp. 420–425). Springer-Verlag, Berlin.
  • Sayal, M., Casati, F., Dayal, U., & Shan, M. (2002). Business Process Cockpit. In Proceedings of 28th international conference on very large data bases (VLDB’02) (pp. 880–883). Morgan Kaufmann.
  • Huser V, Starren JB, EHR Data Pre-processing Facilitating Process Mining: an Application to Chronic Kidney Disease. AMIA Annu Symp Proc 2009 link
  • Ross-Talbot S, The importance and potential of descriptions to our industry. Keynote at The 10th International Federated Conference on Distributed Computing Techniques [1]

External links