Process mining

Process mining is a family of techniques relating the fields of data science and process management to support the analysis of operational processes based on event logs. The goal of process mining is to turn event data into insights and actions. Process mining is an integral part of data science, fueled by the availability of data and the desire to improve processes.[1] Process mining techniques use event data to show what people, machines, and organizations are really doing. Process mining provides novel insights that can be used to identify and address performance and compliance problems. Currently, there are over 35 software vendors offering process mining tools software (e.g., Celonis, Disco, UiPath, myInvenio, PAFnow, Minit, QPR, Mehrwerk, Puzzledata, LanaLabs, StereoLogic, Everflow, TimelinePI, Apromore, Signavio, and Logpickr).[2]

Process mining starts from event data. Input for process mining is an event log. An event log views a process from a particular angle. Each event in the log refers to (1) a particular process instance (called case), (2) an activity, and (3) a timestamp. There may be additional event attributes referring to resources, people, costs, etc., but these are optional. With some effort, such data can be extracted from any information system supporting operational processes. Process mining uses these event data to answer a variety of process-related questions. Process mining techniques such as process discovery, conformance checking, model enhancement, and operational support can be used to improve performance and compliance.[3]

There are three main classes of process mining techniques: process discovery, conformance checking, and performance mining (also called extension, see below). In the past terms like Workflow Mining and Automated Business Process Discovery (ABPD) [4] were used. However, in academic literature[5] the term Automated Business Process Discovery is used in a narrower sense to refer specifically to techniques that take as input an event log and produce as output a business process model. Today, process mining is is used in a broader setting to refer not only to techniques for discovering process models, but also techniques for business process conformance and performance analysis based on event logs.

Overview

Process mining techniques are often used when no formal description of the process can be obtained by other approaches, or when the quality of existing documentation is questionable. Per Gartner, Process Mining is a subset of hyperautomation.[6] For example, application of process mining methodology to the audit trails of a workflow management system, the transaction logs of an enterprise resource planning system, or the electronic patient records in a hospital can result in models describing processes, organizations, and products.[7] Event log analysis can also be used to compare event logs with prior model(s) to understand whether the observations conform to a prescriptive or descriptive model. It is required that the event logs data be linked to a case ID, activities, and timestamps[8] · .[9]

Contemporary management trends such as BAM (Business Activity Monitoring), BOM (Business Operations Management), and BPI (business process intelligence) illustrate the interest in supporting diagnosis functionality in the context of Business Process Management technology (e.g., Workflow Management Systems and other process-aware information systems). Process mining is different from mainstream machine learning, data mining, and artificial intelligence techniques. For example, process discovery techniques in the field of process mining try to discover end-to-end process models that are also able to describe concurrent behavior. Conformance checking techniques are closer to optimization than to traditional learning approaches. However, process mining can be used to generate machine learning, data mining, and artificial intelligence problems. After discovering a process model and aligning the event log, it is possible to create basic supervised and unsupervised learning problems. For example, to predict the remaining processing time of a running case or to identify the root causes of compliance problems.

The IEEE Task Force on Process Mining was established in October 2009 as part of the IEEE Computational Intelligence Society.[10] This is a vendor-neutral organization aims to promote the research, development, education and understanding of process mining, make end-users, developers, consultants, and researchers aware of the state-of-the-art in process mining, promote the use of process mining techniques and tools and stimulate new applications, play a role in standardization efforts for logging event data (e.g., XES), organize tutorials, special sessions, workshops, competitions, panels, and develop material (papers, books, online courses, movies, etc.) to inform and guide people new to the field. The IEEE Task Force on Process Mining established the International Process Mining Conference (ICPM) series,[11] lead the development of the IEEE XES standard for storing and exchanging event data [12] [13], and wrote the Process Mining Manifesto[14] which was translated into 16 languages.

Applications

Process mining has been applied in all industries (e.g., banking, insurance, production, logistics, transportation, telecom, energy, and healthcare). Examples of organizations applying process at a large scale are Siemens, BMW, Zalando, Uber, Lufthansa, AkzoNobel, ABB, Elsevier, Neste, and Vodafone.[15] HSPI regularly publishes a database with example process mining applications. In 2020 there were 551 case studies from 27 countries around the world.[16]

Classification

There are three classes of process mining techniques. This classification is based on whether there is a prior model and, if so, how the prior model is used during process mining.

  • Discovery: Previous (a priori) models do not exist. Based on an event log, a new model is constructed or discovered based on low-level events. For example, using the alpha algorithm (a didactically driven approach).[17] Many established techniques exist for automatically constructing process models (for example, Petri nets, BPMN diagrams, activity diagrams, State diagrams, and EPCs) based on an event log.[17][18][19][20][21] Recently, process mining research has started targeting the other perspectives (e.g., data, resources, time, etc.). One example is the technique described in (Aalst, Reijers, & Song, 2005),[22] which can be used to construct a social network.
  • Conformance checking: Used when there is an a priori model. The existing model is compared with the process event log; discrepancies between the log and the model are analyzed. For example, there may be a process model indicating that purchase orders of more than 1 million Euro require two checks. Another example is the checking of the so-called "four-eyes" principle. Conformance checking may be used to detect deviations to enrich the model. An example is the extension of a process model with performance data, i.e., some a priori process model is used to project the potential bottlenecks. Another example is the decision miner described in (Rozinat & Aalst, 2006b)[23] which takes an a priori process model and analyzes every choice in the process model. For each choice, the event log is consulted to see which information is typically available the moment the choice is made. Then classical data mining techniques are used to see which data elements influence the choice. As a result, a decision tree is generated for each choice in the process.
  • Performance Mining: Used when there is an a priori model. The model is extended with additional performance information such as processing times, cycle times, waiting times, costs, etc., so that the goal is not to check conformance, but rather to improve the performance of the existing model with respect to certain process performance measures. An example is the extension of a process model with performance data, i.e., some prior process model dynamically annotated with performance data. It is also possible to extend process models with additional information such as decision rules and organizational information (e.g., roles).

See also

References

  1. van der Aalst, Wil (2016). Process Mining: Data Science in Action.
  2. Kerremans, Marc (2020). Market Guide for Process Mining (G00733123).
  3. van der Aalst, Wil (2011). Process Mining: Data Science in Action.
  4. "Automated Business Process Discovery (ABPD)". Gartner.com. Gartner, Inc. 2015. Retrieved 6 January 2015.Gartner Definition.
  5. Dumas, Marlon; La Rosa, Marcello; Mendling, Jan; Reijers, Hajo A. (2018). Fundamentals of Business Process Management (2nd ed.). Springer.
  6. "Gartner Top 10 Strategic Technology Trends for 2020". Gartner.
  7. Kirchmer, M., Laengle, S., & Masias, V. (2013). Transparency-Driven Business Process Management in Healthcare Settings [Leading Edge]. Technology and Society Magazine, IEEE, 32(4), 14-16.
  8. Luis M. Camarinha-Matos, Frederick Benaben, Willy Picard (2015). Risks and Resilience of Collaborative Networks
  9. Symeon Christodoulou, Raimar Scherer (2016). eWork and eBusiness in Architecture, Engineering and Construction: ECPPM 2016
  10. "IEEE Task Force on Process Mining". Home page of the task force on process mining. IEEE Task Force on Process Mining. Retrieved 10 January 2021.
  11. "International Process Mining Conference (ICPM) series". Home page of the ICPM conference series. IEEE Task Force on Process Mining. Retrieved 10 January 2021.
  12. "IEEE Standard for eXtensible Event Stream (XES) for Achieving Interoperability in Event Logs and Event Streams". IEEE Standard for eXtensible Event Stream (XES). ieee. 11 November 2016. Retrieved 10 January 2021.
  13. "eXtensible Event Stream (XES)". eXtensible Event Stream (XES). IEEE Task Force on Process Mining. 11 November 2016. Retrieved 10 January 2021.
  14. "Process Mining Manifesto". Process Mining Manifesto. IEEE Task Force on Process Mining. 2011. Retrieved 10 January 2021.
  15. Reinkemeyer, Lars (2020). PProcess Mining in Action: Principles, Use Cases and Outlook.
  16. "Process Mining Applications Database 2020". HSPI. HSPI. 20 January 2020. Retrieved 10 January 2021.
  17. Aalst, W. van der, Weijters, A., & Maruster, L. (2004). Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering, 16 (9), 1128–1142.
  18. Agrawal, R., Gunopulos, D., & Leymann, F. (1998). Mining Process Models from Workflow Logs. In Sixth international conference on extending database technology (pp. 469–483).
  19. Cook, J., & Wolf, A. (1998). Discovering Models of Software Processes from Event-Based Data. ACM Transactions on Software Engineering and Methodology, 7 (3), 215–249.
  20. Datta, A. (1998). Automating the Discovery of As-Is Business Process Models: Probabilistic and Algorithmic Approaches. Information Systems Research, 9 (3), 275–301.
  21. Weijters, A., & Aalst, W. van der (2003). Rediscovering Workflow Models from Event-Based Data using Little Thumb. Integrated Computer-Aided Engineering, 10 (2), 151–162.
  22. Aalst, W. van der, Beer, H., & Dongen, B. van (2005). Process Mining and Verification of Properties: An Approach based on Temporal Logic. In R. Meersman & Z. T. et al. (Eds.), On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE: OTM Confederated International Conferences, CoopIS, DOA, and ODBASE 2005 (Vol. 3760, pp. 130–147). Springer-Verlag, Berlin.
  23. Rozinat, A., & Aalst, W. van der (2006a). Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models. In C. Bussler et al. (Ed.), BPM 2005 Workshops (Workshop on Business Process Intelligence) (Vol. 3812, pp. 163–176). Springer-Verlag, Berlin.

Further reading

  • Aalst, W. van der (2016). Process Mining: Data Science in Action. Springer Verlag, Berlin (ISBN 978-3-662-49850-7).
  • Reinkemeyer, L. (2020). Process Mining in Action: Principles, Use Cases and Outlook. Springer Verlag, Berlin (ISBN 978-3-030-40171-9).
  • Carmona, J., van Dongen, B.F., Solti, A., Weidlich, M. (2018). Conformance Checking: Relating Processes and Models. Springer Verlag, Berlin (ISBN 978-3-319-99413-0).
  • Aalst, W. van der (2011). Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer Verlag, Berlin (ISBN 978-3-642-19344-6).
  • Aalst, W. van der, Dongen, B. van, Herbst, J., Maruster, L., Schimm, G., & Weijters, A. (2003). Workflow Mining: A Survey of Issues and Approaches. Data and Knowledge Engineering, 47 (2), 237–267.
  • Aalst, W. van der, Reijers, H., & Song, M. (2005). Discovering Social Networks from Event Logs. Computer Supported Cooperative work, 14 (6), 549–593.
  • Jans, M., van der Werf, J.M., Lybaert, N., Vanhoof, K. (2011) A business process mining application for internal transaction fraud mitigation, Expert Systems with Applications, 38 (10), 13351–13359
  • Dongen, B. van, Medeiros, A., Verbeek, H., Weijters, A., & Aalst, W. van der (2005). The ProM framework: A New Era in Process Mining Tool Support. In G. Ciardo & P. Darondeau (Eds.), Application and Theory of Petri Nets 2005 (Vol. 3536, pp. 444–454). Springer-Verlag, Berlin.
  • Aalst, W. van der. A Practitioner's Guide to Process Mining: Limitations of the Directly-Follows Graph. In International Conference on Enterprise Information Systems (Centeris 2019), volume 164 of Procedia Computer Science, pages 321-328. Elsevier, 2019.
  • Dumas, M., Aalst, W. van der, & Hofstede, A. ter (2005). Process-Aware Information Systems: Bridging People and Software through Process Technology. Wiley & Sons.
  • Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., & Shan, M. (2004). Business Process Intelligence. Computers in Industry, 53 (3), 321–343.
  • Grigori, D., Casati, F., Dayal, U., & Shan, M. (2001). Improving Business Process Quality through Exception Understanding, Prediction, and Prevention. In P. Apers, P. Atzeni, S. Ceri, S. Paraboschi, K. Ramamohanarao, & R. Snodgrass (Eds.), Proceedings of 27th international conference on Very Large Data Bases (VLDB’01) (pp. 159–168). Morgan Kaufmann.
  • IDS Scheer. (2002). ARIS Process Performance Manager (ARIS PPM): Measure, Analyze and Optimize Your Business Process Performance (whitepaper).
  • Ingvaldsen, J.E., & J.A. Gulla. (2006). Model Based Business Process Mining. Journal of Information Systems Management, Vol. 23, No. 1, Special Issue on Business Intelligence, Auerbach Publications
  • Kirchmer, M., Laengle, S., & Masias, V. (2013). Transparency-Driven Business Process Management in Healthcare Settings [Leading Edge]. Technology and Society Magazine, IEEE, 32(4), 14-16.
  • zur Muehlen, M. (2004). Workflow-based Process Controlling: Foundation, Design and Application of workflow-driven Process Information Systems. Logos, Berlin.
  • zur Muehlen, M., & Rosemann, M. (2000). Workflow-based Process Monitoring and Controlling – Technical and Organizational Issues. In R. Sprague (Ed.), Proceedings of the 33rd Hawaii international conference on system science (HICSS-33) (pp. 1–10). IEEE Computer Society Press, Los Alamitos, California.
  • Rozinat, A., & Aalst, W. van der (2006b). Decision Mining in ProM. In S. Dustdar, J. Faideiro, & A. Sheth (Eds.), International Conference on Business Process Management (BPM 2006) (Vol. 4102, pp. 420–425). Springer-Verlag, Berlin.
  • Sayal, M., Casati, F., Dayal, U., & Shan, M. (2002). Business Process Cockpit. In Proceedings of 28th international conference on very large data bases (VLDB’02) (pp. 880–883). Morgan Kaufmann.
  • Huser V, Starren JB, EHR Data Pre-processing Facilitating Process Mining: an Application to Chronic Kidney Disease. AMIA Annu Symp Proc 2009 link
  • Ross-Talbot S, The importance and potential of descriptions to our industry. Keynote at The 10th International Federated Conference on Distributed Computing Techniques
  • Garcia, Cleiton dos Santos; Meincheim, Alex; et al. (2019). Process mining techniques and applications – A systematic mapping study». Expert Systems with Applications. 133: 260–295. ISSN 0957-4174. doi:10.1016/j.eswa.2019.05.003
  • van der Aalst, W.M.P. and Berti A. Discovering Object-Centric Petri Nets. Fundamenta Informaticae, 175(1-4):1-40, 2020.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.