SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
Process	
  Mining	
  
for	
  
Customer	
  Support	
  
Haim	
  Toeg	
  
supportagility.com	
  	
  
Process mining is a discipline positioned at the
crossroads of computational intelligence, data
mining, and process modeling and analysis. The idea
of process mining is to discover, monitor and improve
real processes by extracting knowledge from the
event logs produced as part of on-going business
activity.
Adapted from Process Mining Manifesto
What Is Process Mining?
Process	
  Aware	
  System	
  Lifecycle	
  
Some	
  reasons	
  support	
  may	
  adapt	
  well	
  to	
  Process	
  Mining:	
  
*  Highly	
  disciplined	
  
*  Heavily	
  instrumented	
  and	
  regimented	
  
*  Fairly	
  well	
  documented	
  processes	
  
*  Culture	
  of	
  metrics	
  and	
  improvement	
  
Why	
  Support?	
  
*  Business:	
  Do	
  More	
  With	
  Less	
  
*  Efficiency	
  and	
  Effectiveness	
  
*  Reduce	
  cost	
  /	
  case	
  or	
  /	
  customer	
  -­‐>	
  Operational	
  metrics	
  
*  Case	
  life,	
  backlog,	
  time	
  since	
  last	
  touched	
  
*  Cases	
  /	
  installation	
  
*  Improve	
  effectiveness	
  -­‐>	
  Result	
  metrics	
  
*  NPS,	
  CSAT	
  
*  Correlate	
  and	
  analyze	
  data	
  
*  Prioritized	
  action	
  list	
  	
  
Process	
  Improvement	
  Goals	
  
*  Greater	
  granularity	
  <-­‐>	
  abstraction	
  
*  Drill	
  down	
  to	
  individual	
  process	
  elements	
  
*  Segregate	
  data	
  by	
  operational	
  element	
  (geo,	
  product)	
  
*  Combine	
  process	
  elements	
  to	
  study	
  overall	
  activity	
  
Improving	
  Process	
  Improvement	
  
Yes,	
  we	
  do!	
  
But,	
  We	
  Don’t	
  Have	
  The	
  Data	
  
Traditional Operation
Weaknesses?	
  
*  Reliance	
  on	
  generalized	
  metrics	
  
*  Anecdotal	
  review	
  of	
  one	
  or	
  small	
  number	
  of	
  process	
  
instances	
  
*  Limited	
  ability	
  to	
  drill	
  down	
  and	
  investigate	
  
*  Not	
  much	
  abstraction	
  ability	
  either	
  
*  Event	
  logs	
  used	
  only	
  sporadically	
  and	
  reactively	
  
Familiar?	
  
With	
  Process	
  Mining	
  –	
  Discovery	
  
*  Model	
  the	
  executed,	
  real-­‐world,	
  processes	
  
*  Identify	
  and	
  review	
  process	
  variants	
  
*  Discover	
  informal	
  collaboration	
  and	
  knowledge	
  
*  Investigate	
  and	
  measure	
  every	
  action	
  and	
  transition	
  
*  Support	
  for	
  Lean	
  perspectives	
  
*  Workload	
  /	
  People	
  perspectives	
  
	
  
Discovery	
  Benefits	
  
Discovery	
  Results	
  
Case	
  flow	
  via	
  activities:	
  
Process	
  flow:	
  
•  Activity	
  Frequency	
  	
  
Bottlenecks:	
  
•  Critical	
  activities	
  and	
  
paths	
  
•  Investigate	
  operational	
  
metrics	
  
Lean	
  Resource	
  Perspective	
  
Activity	
  flow	
  through	
  cases:	
  
•  Most	
  demanding	
  cases	
  
•  Case	
  idle	
  times	
  
Bottleneck	
  Identification	
  
Critical	
  Resources:	
  
•  People	
  
•  Machines	
  	
  
Collaboration	
  
Flow	
  of	
  work	
  through	
  specific	
  
people	
  or	
  resources:	
  
•  Knowledge	
  centers	
  
•  Critical	
  resources	
  
Conformance	
  
Combine	
  your	
  existing	
  and	
  discovered	
  process	
  models:	
  
*  Find	
  degree	
  of	
  conformance	
  between	
  the	
  two	
  
*  Understand	
  repeat	
  offences	
  and	
  take	
  corrective	
  action	
  
*  Systems	
  
*  Processes	
  
*  Metrics	
  	
  
*  People	
  
*  Estimate	
  cost	
  and	
  benefit	
  of	
  alignment	
  vs.	
  no	
  action	
  
Conformance	
  Benefits	
  
Conformance	
  Report	
  
*  Leverage	
  existing	
  data	
  using	
  recently	
  developed	
  leading	
  
edge	
  techniques	
  
*  Review	
  executed	
  processes	
  in	
  detail	
  to	
  get:	
  
*  Excessively	
  repeated	
  activities	
  
*  Process	
  bottlenecks	
  
*  Critical	
  resources	
  
*  Knowledge	
  hoarding	
  
*  Drive	
  systematic,	
  prioritized	
  process	
  and	
  organizational	
  
improvement	
  
Process	
  Mining	
  for	
  Support	
  
Eliminate	
  The	
  Disconnect	
  
Thank	
  You	
  
Haim	
  Toeg	
  
supportagility.com	
  
haim.toeg@supportagility.com	
  
+1.832.419.5645	
  
	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Understanding Enterprise Quality Management Systems (EQMS)
Understanding Enterprise Quality Management Systems (EQMS)Understanding Enterprise Quality Management Systems (EQMS)
Understanding Enterprise Quality Management Systems (EQMS)Sparta Systems
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesSlideTeam
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSRazak Mohammed Ali
 
Msp It Goverance And Service Delivery Process
Msp It Goverance And Service Delivery ProcessMsp It Goverance And Service Delivery Process
Msp It Goverance And Service Delivery Processkadhar_masthan
 
Accenture Regulatory Reporting As A Service
Accenture Regulatory Reporting As A ServiceAccenture Regulatory Reporting As A Service
Accenture Regulatory Reporting As A Serviceaccenture
 
Benefits of Integrating ISO and CMMI Service Management System Frameworks
Benefits of Integrating ISO and CMMI Service Management System FrameworksBenefits of Integrating ISO and CMMI Service Management System Frameworks
Benefits of Integrating ISO and CMMI Service Management System FrameworksIntegration Technologies Group Inc
 
Security metrics
Security metrics Security metrics
Security metrics PRAYAGRAJ11
 
FAIR principles and metrics for evaluation
FAIR principles and metrics for evaluationFAIR principles and metrics for evaluation
FAIR principles and metrics for evaluationMichel Dumontier
 
Data-Driven AI - Service Catalogue
Data-Driven AI - Service CatalogueData-Driven AI - Service Catalogue
Data-Driven AI - Service CatalogueRodney Joyce
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
ITIL Incident Management Workflow PowerPoint Presentation Slides
ITIL Incident Management Workflow PowerPoint Presentation SlidesITIL Incident Management Workflow PowerPoint Presentation Slides
ITIL Incident Management Workflow PowerPoint Presentation SlidesSlideTeam
 
Internal Audit 03-03-16
Internal Audit 03-03-16Internal Audit 03-03-16
Internal Audit 03-03-16Lisa Barnes
 
ITIL & CMMI for Services
ITIL & CMMI for ServicesITIL & CMMI for Services
ITIL & CMMI for ServicesNUS-ISS
 
Migrating data: How to reduce risk
Migrating data: How to reduce riskMigrating data: How to reduce risk
Migrating data: How to reduce riskETLSolutions
 
Problem Management Overview
Problem Management OverviewProblem Management Overview
Problem Management OverviewMarval Software
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information SystemsAhmad Tariq Bhatti
 
Keeping the Pulse of Your Data:  Why You Need Data Observability 
Keeping the Pulse of Your Data:  Why You Need Data Observability Keeping the Pulse of Your Data:  Why You Need Data Observability 
Keeping the Pulse of Your Data:  Why You Need Data Observability Precisely
 

Was ist angesagt? (20)

Business one ppt
Business one pptBusiness one ppt
Business one ppt
 
Understanding Enterprise Quality Management Systems (EQMS)
Understanding Enterprise Quality Management Systems (EQMS)Understanding Enterprise Quality Management Systems (EQMS)
Understanding Enterprise Quality Management Systems (EQMS)
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation Slides
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMS
 
Msp It Goverance And Service Delivery Process
Msp It Goverance And Service Delivery ProcessMsp It Goverance And Service Delivery Process
Msp It Goverance And Service Delivery Process
 
Predictive analytics
Predictive analytics Predictive analytics
Predictive analytics
 
Accenture Regulatory Reporting As A Service
Accenture Regulatory Reporting As A ServiceAccenture Regulatory Reporting As A Service
Accenture Regulatory Reporting As A Service
 
Benefits of Integrating ISO and CMMI Service Management System Frameworks
Benefits of Integrating ISO and CMMI Service Management System FrameworksBenefits of Integrating ISO and CMMI Service Management System Frameworks
Benefits of Integrating ISO and CMMI Service Management System Frameworks
 
Security metrics
Security metrics Security metrics
Security metrics
 
FAIR principles and metrics for evaluation
FAIR principles and metrics for evaluationFAIR principles and metrics for evaluation
FAIR principles and metrics for evaluation
 
Data-Driven AI - Service Catalogue
Data-Driven AI - Service CatalogueData-Driven AI - Service Catalogue
Data-Driven AI - Service Catalogue
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
ITIL Incident Management Workflow PowerPoint Presentation Slides
ITIL Incident Management Workflow PowerPoint Presentation SlidesITIL Incident Management Workflow PowerPoint Presentation Slides
ITIL Incident Management Workflow PowerPoint Presentation Slides
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
Internal Audit 03-03-16
Internal Audit 03-03-16Internal Audit 03-03-16
Internal Audit 03-03-16
 
ITIL & CMMI for Services
ITIL & CMMI for ServicesITIL & CMMI for Services
ITIL & CMMI for Services
 
Migrating data: How to reduce risk
Migrating data: How to reduce riskMigrating data: How to reduce risk
Migrating data: How to reduce risk
 
Problem Management Overview
Problem Management OverviewProblem Management Overview
Problem Management Overview
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
 
Keeping the Pulse of Your Data:  Why You Need Data Observability 
Keeping the Pulse of Your Data:  Why You Need Data Observability Keeping the Pulse of Your Data:  Why You Need Data Observability 
Keeping the Pulse of Your Data:  Why You Need Data Observability 
 

Andere mochten auch

Process mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.comProcess mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.comkashif kashif
 
programma plus (flip rosdorff en paul jansen)
programma plus (flip rosdorff en paul jansen)programma plus (flip rosdorff en paul jansen)
programma plus (flip rosdorff en paul jansen)CROW
 
Process mining bazaar 11 11-2015 pdk
Process mining bazaar 11 11-2015 pdkProcess mining bazaar 11 11-2015 pdk
Process mining bazaar 11 11-2015 pdkdrs Pieter de Kok RA
 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingWil van der Aalst
 
Hoe business intelligence zich verhoudt tot process mining
Hoe business intelligence zich verhoudt tot process miningHoe business intelligence zich verhoudt tot process mining
Hoe business intelligence zich verhoudt tot process miningO&i Management Consultants
 
1 frank geffen process mining bij rabobank
1 frank geffen   process mining bij rabobank1 frank geffen   process mining bij rabobank
1 frank geffen process mining bij rabobankNMITSymposium
 
Process Mining als startpunt voor process optimalisatie
Process Mining als startpunt voor process optimalisatieProcess Mining als startpunt voor process optimalisatie
Process Mining als startpunt voor process optimalisatieTriFinance
 
TriFinance - Knowledge Circle Business Intelligence
TriFinance - Knowledge Circle Business IntelligenceTriFinance - Knowledge Circle Business Intelligence
TriFinance - Knowledge Circle Business IntelligenceTriFinance
 
Improving Healthcare Operations Using Process Data Mining
Improving Healthcare Operations Using Process Data Mining Improving Healthcare Operations Using Process Data Mining
Improving Healthcare Operations Using Process Data Mining Splunk
 
Implicaties keuze bouworganisatievorm bij BIM project
Implicaties keuze bouworganisatievorm bij BIM projectImplicaties keuze bouworganisatievorm bij BIM project
Implicaties keuze bouworganisatievorm bij BIM projectLéon Berlo
 
Introducing Process mining in the AECFM
Introducing Process mining in the AECFMIntroducing Process mining in the AECFM
Introducing Process mining in the AECFMLéon Berlo
 
Process Mining based on the Internet of Events
Process Mining based on the Internet of EventsProcess Mining based on the Internet of Events
Process Mining based on the Internet of EventsRising Media Ltd.
 
BIM Handboek- aspectmodellen toelichting BIM congres 2014
BIM Handboek- aspectmodellen toelichting BIM congres 2014BIM Handboek- aspectmodellen toelichting BIM congres 2014
BIM Handboek- aspectmodellen toelichting BIM congres 2014Hans Hendriks
 
Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...
Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...
Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...kashif kashif
 

Andere mochten auch (14)

Process mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.comProcess mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.com
 
programma plus (flip rosdorff en paul jansen)
programma plus (flip rosdorff en paul jansen)programma plus (flip rosdorff en paul jansen)
programma plus (flip rosdorff en paul jansen)
 
Process mining bazaar 11 11-2015 pdk
Process mining bazaar 11 11-2015 pdkProcess mining bazaar 11 11-2015 pdk
Process mining bazaar 11 11-2015 pdk
 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance Checking
 
Hoe business intelligence zich verhoudt tot process mining
Hoe business intelligence zich verhoudt tot process miningHoe business intelligence zich verhoudt tot process mining
Hoe business intelligence zich verhoudt tot process mining
 
1 frank geffen process mining bij rabobank
1 frank geffen   process mining bij rabobank1 frank geffen   process mining bij rabobank
1 frank geffen process mining bij rabobank
 
Process Mining als startpunt voor process optimalisatie
Process Mining als startpunt voor process optimalisatieProcess Mining als startpunt voor process optimalisatie
Process Mining als startpunt voor process optimalisatie
 
TriFinance - Knowledge Circle Business Intelligence
TriFinance - Knowledge Circle Business IntelligenceTriFinance - Knowledge Circle Business Intelligence
TriFinance - Knowledge Circle Business Intelligence
 
Improving Healthcare Operations Using Process Data Mining
Improving Healthcare Operations Using Process Data Mining Improving Healthcare Operations Using Process Data Mining
Improving Healthcare Operations Using Process Data Mining
 
Implicaties keuze bouworganisatievorm bij BIM project
Implicaties keuze bouworganisatievorm bij BIM projectImplicaties keuze bouworganisatievorm bij BIM project
Implicaties keuze bouworganisatievorm bij BIM project
 
Introducing Process mining in the AECFM
Introducing Process mining in the AECFMIntroducing Process mining in the AECFM
Introducing Process mining in the AECFM
 
Process Mining based on the Internet of Events
Process Mining based on the Internet of EventsProcess Mining based on the Internet of Events
Process Mining based on the Internet of Events
 
BIM Handboek- aspectmodellen toelichting BIM congres 2014
BIM Handboek- aspectmodellen toelichting BIM congres 2014BIM Handboek- aspectmodellen toelichting BIM congres 2014
BIM Handboek- aspectmodellen toelichting BIM congres 2014
 
Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...
Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...
Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...
 

Ähnlich wie Process Mining For Customer Support

Improving Performance Improvement (Market Requirements Document - MRD)
Improving Performance Improvement (Market Requirements Document - MRD)Improving Performance Improvement (Market Requirements Document - MRD)
Improving Performance Improvement (Market Requirements Document - MRD)Adam "AB" Bloom
 
Use Case: Celonis in the Financial Services Industry
Use Case: Celonis in the Financial Services IndustryUse Case: Celonis in the Financial Services Industry
Use Case: Celonis in the Financial Services IndustryCelonis
 
Service operation management 4
Service operation management 4Service operation management 4
Service operation management 4Judianto Nugroho
 
Business process mapping
Business process mappingBusiness process mapping
Business process mappingDAVIS THOMAS
 
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsBeyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsMontrium
 
Prescriptive Analytics-1.pptx
Prescriptive Analytics-1.pptxPrescriptive Analytics-1.pptx
Prescriptive Analytics-1.pptxKarthik132344
 
Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaEnergySec
 
LIMS_ASQ.pptx
LIMS_ASQ.pptxLIMS_ASQ.pptx
LIMS_ASQ.pptxArta Doci
 
Quantified Process Improvement Opportunities - Return on Intelligence
Quantified Process Improvement Opportunities - Return on IntelligenceQuantified Process Improvement Opportunities - Return on Intelligence
Quantified Process Improvement Opportunities - Return on IntelligenceDoug Brockway
 
Measurement Roadmap
Measurement RoadmapMeasurement Roadmap
Measurement RoadmapAni Lopez
 
Creating data-driven-org
Creating data-driven-orgCreating data-driven-org
Creating data-driven-orgjay_grossman
 
Lesson 10 - Value stream mapping
Lesson 10 - Value stream mappingLesson 10 - Value stream mapping
Lesson 10 - Value stream mappingTunAnhTrnh9
 
Using iga to promote students
Using iga to promote studentsUsing iga to promote students
Using iga to promote studentsThỏ Ngọc
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system designRahul Hedau
 
Designing fit for purpose data structures
Designing fit for purpose data structuresDesigning fit for purpose data structures
Designing fit for purpose data structuresStephen Bounds
 

Ähnlich wie Process Mining For Customer Support (20)

MI Business Analysis
MI Business AnalysisMI Business Analysis
MI Business Analysis
 
Improving Performance Improvement (Market Requirements Document - MRD)
Improving Performance Improvement (Market Requirements Document - MRD)Improving Performance Improvement (Market Requirements Document - MRD)
Improving Performance Improvement (Market Requirements Document - MRD)
 
Use Case: Celonis in the Financial Services Industry
Use Case: Celonis in the Financial Services IndustryUse Case: Celonis in the Financial Services Industry
Use Case: Celonis in the Financial Services Industry
 
Service operation management 4
Service operation management 4Service operation management 4
Service operation management 4
 
Business process mapping
Business process mappingBusiness process mapping
Business process mapping
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineering
 
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsBeyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
 
Prescriptive Analytics-1.pptx
Prescriptive Analytics-1.pptxPrescriptive Analytics-1.pptx
Prescriptive Analytics-1.pptx
 
Decision making.PPT
Decision making.PPTDecision making.PPT
Decision making.PPT
 
Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six Sigma
 
LIMS_ASQ.pptx
LIMS_ASQ.pptxLIMS_ASQ.pptx
LIMS_ASQ.pptx
 
20959.pptx
20959.pptx20959.pptx
20959.pptx
 
Quantified Process Improvement Opportunities - Return on Intelligence
Quantified Process Improvement Opportunities - Return on IntelligenceQuantified Process Improvement Opportunities - Return on Intelligence
Quantified Process Improvement Opportunities - Return on Intelligence
 
Measurement Roadmap
Measurement RoadmapMeasurement Roadmap
Measurement Roadmap
 
Creating data-driven-org
Creating data-driven-orgCreating data-driven-org
Creating data-driven-org
 
Lesson 10 - Value stream mapping
Lesson 10 - Value stream mappingLesson 10 - Value stream mapping
Lesson 10 - Value stream mapping
 
Using iga to promote students
Using iga to promote studentsUsing iga to promote students
Using iga to promote students
 
Process mapping
Process mappingProcess mapping
Process mapping
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system design
 
Designing fit for purpose data structures
Designing fit for purpose data structuresDesigning fit for purpose data structures
Designing fit for purpose data structures
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Process Mining For Customer Support

  • 1. Process  Mining   for   Customer  Support   Haim  Toeg   supportagility.com    
  • 2. Process mining is a discipline positioned at the crossroads of computational intelligence, data mining, and process modeling and analysis. The idea of process mining is to discover, monitor and improve real processes by extracting knowledge from the event logs produced as part of on-going business activity. Adapted from Process Mining Manifesto What Is Process Mining?
  • 3. Process  Aware  System  Lifecycle  
  • 4. Some  reasons  support  may  adapt  well  to  Process  Mining:   *  Highly  disciplined   *  Heavily  instrumented  and  regimented   *  Fairly  well  documented  processes   *  Culture  of  metrics  and  improvement   Why  Support?  
  • 5. *  Business:  Do  More  With  Less   *  Efficiency  and  Effectiveness   *  Reduce  cost  /  case  or  /  customer  -­‐>  Operational  metrics   *  Case  life,  backlog,  time  since  last  touched   *  Cases  /  installation   *  Improve  effectiveness  -­‐>  Result  metrics   *  NPS,  CSAT   *  Correlate  and  analyze  data   *  Prioritized  action  list     Process  Improvement  Goals  
  • 6. *  Greater  granularity  <-­‐>  abstraction   *  Drill  down  to  individual  process  elements   *  Segregate  data  by  operational  element  (geo,  product)   *  Combine  process  elements  to  study  overall  activity   Improving  Process  Improvement  
  • 7. Yes,  we  do!   But,  We  Don’t  Have  The  Data  
  • 9. Weaknesses?   *  Reliance  on  generalized  metrics   *  Anecdotal  review  of  one  or  small  number  of  process   instances   *  Limited  ability  to  drill  down  and  investigate   *  Not  much  abstraction  ability  either   *  Event  logs  used  only  sporadically  and  reactively   Familiar?  
  • 10. With  Process  Mining  –  Discovery  
  • 11. *  Model  the  executed,  real-­‐world,  processes   *  Identify  and  review  process  variants   *  Discover  informal  collaboration  and  knowledge   *  Investigate  and  measure  every  action  and  transition   *  Support  for  Lean  perspectives   *  Workload  /  People  perspectives     Discovery  Benefits  
  • 12. Discovery  Results   Case  flow  via  activities:   Process  flow:   •  Activity  Frequency     Bottlenecks:   •  Critical  activities  and   paths   •  Investigate  operational   metrics  
  • 13. Lean  Resource  Perspective   Activity  flow  through  cases:   •  Most  demanding  cases   •  Case  idle  times  
  • 14. Bottleneck  Identification   Critical  Resources:   •  People   •  Machines    
  • 15. Collaboration   Flow  of  work  through  specific   people  or  resources:   •  Knowledge  centers   •  Critical  resources  
  • 17. Combine  your  existing  and  discovered  process  models:   *  Find  degree  of  conformance  between  the  two   *  Understand  repeat  offences  and  take  corrective  action   *  Systems   *  Processes   *  Metrics     *  People   *  Estimate  cost  and  benefit  of  alignment  vs.  no  action   Conformance  Benefits  
  • 19. *  Leverage  existing  data  using  recently  developed  leading   edge  techniques   *  Review  executed  processes  in  detail  to  get:   *  Excessively  repeated  activities   *  Process  bottlenecks   *  Critical  resources   *  Knowledge  hoarding   *  Drive  systematic,  prioritized  process  and  organizational   improvement   Process  Mining  for  Support  
  • 21. Thank  You   Haim  Toeg   supportagility.com   haim.toeg@supportagility.com   +1.832.419.5645