SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Chapter 1
Introduction

prof.dr.ir. Wil van der Aalst
www.processmining.org
Overview
Chapter 1
Introduction



Part I: Preliminaries

Chapter 2                   Chapter 3
Process Modeling and        Data Mining
Analysis


Part II: From Event Logs to Process Models

Chapter 4                  Chapter 5               Chapter 6
Getting the Data           Process Discovery: An   Advanced Process
                           Introduction            Discovery Techniques


Part III: Beyond Process Discovery

Chapter 7                   Chapter 8              Chapter 9
Conformance                 Mining Additional      Operational Support
Checking                    Perspectives


Part IV: Putting Process Mining to Work

Chapter 10                  Chapter 11             Chapter 12
Tool Support                Analyzing “Lasagna     Analyzing “Spaghetti
                            Processes”             Processes”


Part V: Reflection

Chapter 13                  Chapter 14
Cartography and             Epilogue
Navigation
                                                                          PAGE 1
Data explosion




                 PAGE 2
The World's Technological Capacity to Store, Communicate, and Compute
Information by Martin Hilbert and Priscila López (DOI 10.1126/science.1200970)




                                                                                 PAGE 3
PAGE 4
Example process model



                          examine
                         thoroughly

                   c1                   c3                       pay
                                                             compensation
                          examine
start   register          casually           decide    c5                    end
        request
                    c2                  c4                      reject
                         check ticket                          request
                                                reinitiate
                                                 request




                                                                            PAGE 5
Same process in terms of BPMN
        rather than Petri nets

                      examine
                     thoroughly



                                                              pay
                      examine
                                                          compensation
                      casually
          register
                                                 decide
          request
start                                                        reject          end
                     check ticket
                                                            request
                                    reinitiate
                                     request




                                                                         PAGE 6
What are process models used for?

• insight: while making a model, the modeler is triggered to view the
  process from various angles;
• discussion: the stakeholders use models to structure discussions;
• documentation: processes are documented for instructing people or
  certification purposes (cf. ISO 9000 quality management);
• verification: process models are analyzed to find errors in systems or
  procedures (e.g., potential deadlocks);
• performance analysis: techniques like simulation can be used to
  understand the factors influencing response times, service levels, etc.;
• animation: models enable end users to “play out” different scenarios
  and thus provide feedback to the designer;
• specification: models can be used to describe a PAIS before it is
  implemented and can hence serve as a “contract” between the
  developer and the end user/management; and
• configuration: models can be used to configure a system.
                                                                   PAGE 7
Limitations

• Executable models may be used to force people to
  work in a particular manner.
• However, most models are not well-aligned with
  reality.
• Most hand-made models are disconnected from
  reality and provide only an idealized view on the
  processes at hand: “paper tigers”.
• Given (a) the interest in process models, (b) the
  abundance of event data, and (c) the limited quality
  of hand-made models, it seems worthwhile to relate
  event data to process models: process mining!

                                                     PAGE 8
BPM life-cycle showing the classical
uses of process models


                                    diagnosis/
                                  requirements
adjustment                                          insight
                                                     discussion        performance
                                                       animation       analysis
             enactment/
                                                                 (re)design
             monitoring         data      models
                                                    verification
                          documentation
                                                 specification
                                  configuration/
                                 implementation
                                                    configuration




                                                                              PAGE 9
The three main types of process mining:
discovery, conformance, and enhancement
                                supports/
        “world”    business
                                 controls
                  processes                      software
     people   machines                            system
          components
             organizations                              records
                                                     events, e.g.,
                                                      messages,
                                     specifies       transactions,
      models
                                    configures            etc.
     analyzes
                                   implements
                                     analyzes


                               discovery
          (process)                                 event
                              conformance
            model                                    logs
                              enhancement
                                                                     PAGE 10
Orthogonal: Perspectives

• The control-flow perspective focuses on the control-
  flow, i.e., the ordering of activities.
• The organizational perspective focuses on
  information about resources hidden in the log, i.e.,
  which actors (e.g., people, systems, roles, and
  departments) are involved and how are they related.
• The case perspective focuses on properties of
  cases, e.g., cases can also be characterized by the
  values of the corresponding data elements.
• The time perspective is concerned with the timing
  and frequency of events.

                                                    PAGE 11
Starting point: event log




                        XES, MXML, SA-MXML, CSV, etc.

                                                PAGE 12
Simplified event log




                       a = register request,
                       b = examine thoroughly,
                       c = examine casually,
                       d = check ticket,
                       e = decide,
                       f = reinitiate request,
                       g = pay compensation,
                       and h = reject request
                                          PAGE 13
Process
discovery




                              b
                          examine
                         thoroughly
                                                                       g
                   c1                   c3                            pay
                              c                                   compensation
           a              examine
                                                 e
start   register          casually           decide         c5                   end
        request
                                                                       h
                    c2        d         c4                           reject
                         check ticket                               request
                                             f
                                                     reinitiate
                                                      request
                                                                                 PAGE 14
Another example




                             b
                   c1    examine       c3
                        thoroughly
           a                                  e             h
start   register                            decide   c5    reject    end
        request                                           request
                             d
                   c2   check ticket   c4




                                                                    PAGE 15
Beyond discovery:
conformance and enhancement
                             supports/
     “world”    business
                              controls
               processes                      software
  people   machines                            system
       components
          organizations                              records
                                                  events, e.g.,
                                                   messages,
                                  specifies       transactions,
    models
                                 configures            etc.
   analyzes
                                implements
                                  analyzes


                            discovery
       (process)                                 event
                           conformance
         model                                    logs
                           enhancement
                                                                  PAGE 16
Another event log




                              b
                          examine
                         thoroughly
                                                                       g
                   c1                   c3                            pay
                              c                                   compensation
           a              examine
                                                 e
start   register          casually           decide         c5                   end
        request
                                                                       h
                    c2        d         c4                           reject
                         check ticket                               request
                                             f
                                                     reinitiate
                                                      request                          PAGE 17
Extension
 The event log can be used to
 discover roles in the organization
 (e.g., groups of people with similar
 work patterns). These roles can be                       Performance information (e.g., the
 used to relate individuals and                           average time between two
 activities.                                              subsequent activities) can be
                                                          extracted from the event log and
                                                          visualized on top of the model.


            Role A:            Role E:      Role M:
           Assistant           Expert       Manager
                                                                                   Decision rules (e.g., a decision tree
                                                                                   based on data known at the time a
                  Pete             Sue             Sara                            particular choice was made) can be
                                                                                   learned from the event log and used
                  Mike            Sean                                             to annotated decisions.


                  Ellen                       E


                                               b
                                                                                                A
                                           examine
                                          thoroughly
                                              A
                                                                                                 g
                          A                                              M
                                    c1                     c3                                 pay
                                               c                                          compensation
                          a                examine
                                                                         e
                                                                                                A
          start     register               casually
                                             A                       decide         c5                     end
                    request
                                                                                                 h
                                     c2        d          c4        M                          reject
                                          check ticket                                        request
                                                                     f
                                                                             reinitiate
                                                                              request                                      PAGE 18
Play-Out




     process model   event log




                        PAGE 19
Play-In




event log   process model




                            PAGE 20
Replay




                            •   extended model
                                showing times,
                                frequencies, etc.
                            •   diagnostics
                            •   predictions
                            •   recommendations
event log   process model




                                             PAGE 21
Replay

• Connecting models to real events is crucial!
• Possible uses:
   − Conformance checking
   − Repairing models
   − Extending the model with frequencies and temporal
     information
   − Constructing predictive models
   − Operational support (prediction, recommendation,
     etc.)




                                                     PAGE 22
Desire lines in process models




                                 PAGE 23
Trends and terms

•   Business Process Management (BPM)
•   Business Intelligence (BI)
•   Online Analytical Processing (OLAP)
•   Business Activity Monitoring (BAM)
•   Complex Event Processing (CEP)
•   Corporate Performance Management (CPM)
•   Visual Analytics (VA)
•   Predictive Analytics (PA)
•   Continuous Process Improvement (CPI)
•   Total Quality Management (TQM)
•   Six Sigma
                                             PAGE 24
Six Sigma

• Six Sigma was originally developed by Motorola in
  the early 1980s.
• DMAIC approach:
   − Define the problem and set targets,
   − Measure key performance indicators and collect data,
   − Analyze the data to investigate and verify cause-and-
     effect relationships,
   − Improve the current process based on this analysis,
   − Control the process to minimize deviations from the
     target.



                                                       PAGE 25
[μ-6σ, μ+6σ] with a 1.5σ shift

                                 A process that “runs at
                                  Six Sigma” has only
                                 3.4 defective cases per
                                  million cases, i.e., on
                                  average 99.9997% of
                                  the cases is handled
                                        properly.




                                                   PAGE 26
Performance improvement versus
compliance

• Organizations are also putting more emphasis on
  corporate governance, risk, and compliance.
• Scandals (Enron, Tyco, Adelphia, Peregrine,
  WorldCom, etc.) have fueled interest in more
  rigorous auditing practices.
• New legislation such as the Sarbanes-Oxley Act
  (SOX) of 2002 and the Basel II Accord of 2004
  emerged as a result.
• Importance of verifying whether organizations
  operate “within their boundaries” is increasing.



                                                     PAGE 27
Outlook

     Chapter 1
     Introduction



     Part I: Preliminaries

     Chapter 2                   Chapter 3
     Process Modeling and        Data Mining
     Analysis


     Part II: From Event Logs to Process Models

     Chapter 4                  Chapter 5               Chapter 6
     Getting the Data           Process Discovery: An   Advanced Process
                                Introduction            Discovery Techniques


     Part III: Beyond Process Discovery

     Chapter 7                   Chapter 8              Chapter 9
     Conformance                 Mining Additional      Operational Support
     Checking                    Perspectives


     Part IV: Putting Process Mining to Work

     Chapter 10                  Chapter 11             Chapter 12
     Tool Support                Analyzing “Lasagna     Analyzing “Spaghetti
                                 Processes”             Processes”


     Part V: Reflection

     Chapter 13                  Chapter 14
     Cartography and             Epilogue
     Navigation                                                                PAGE 28

Weitere ähnliche Inhalte

Was ist angesagt?

Business Process Re-engineering BPR
Business Process Re-engineering BPRBusiness Process Re-engineering BPR
Business Process Re-engineering BPR
adcom2015
 

Was ist angesagt? (20)

Process Mining - Chapter 12 - Analyzing Spaghetti Processes
Process Mining - Chapter 12 - Analyzing Spaghetti ProcessesProcess Mining - Chapter 12 - Analyzing Spaghetti Processes
Process Mining - Chapter 12 - Analyzing Spaghetti Processes
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process Modeling
 
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
 
Business Process Management Introduction
Business Process Management IntroductionBusiness Process Management Introduction
Business Process Management Introduction
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process Modeling
 
Introduction to BPM, Business Process Management, BPM
Introduction to BPM, Business Process Management, BPMIntroduction to BPM, Business Process Management, BPM
Introduction to BPM, Business Process Management, BPM
 
Fundamentals of business process management and BPMN
Fundamentals of business process management and BPMNFundamentals of business process management and BPMN
Fundamentals of business process management and BPMN
 
Success Factors for Process Mining Technology
Success Factors for Process Mining TechnologySuccess Factors for Process Mining Technology
Success Factors for Process Mining Technology
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 
Introduction to BPM
Introduction to BPMIntroduction to BPM
Introduction to BPM
 
Build data quality rules and data cleansing into your data pipelines
Build data quality rules and data cleansing into your data pipelinesBuild data quality rules and data cleansing into your data pipelines
Build data quality rules and data cleansing into your data pipelines
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process Modeling
 
Ppt for Application of big data
Ppt for Application of big dataPpt for Application of big data
Ppt for Application of big data
 
How to use BPMN* for modelling business processes
How to use BPMN* for modelling business processesHow to use BPMN* for modelling business processes
How to use BPMN* for modelling business processes
 
Business Process Management Training 1
Business Process Management Training 1Business Process Management Training 1
Business Process Management Training 1
 
Google Cloud and Data Pipeline Patterns
Google Cloud and Data Pipeline PatternsGoogle Cloud and Data Pipeline Patterns
Google Cloud and Data Pipeline Patterns
 
Business Process Re-engineering BPR
Business Process Re-engineering BPRBusiness Process Re-engineering BPR
Business Process Re-engineering BPR
 
Determining Organizational Fit for Transformation Success
Determining Organizational Fit for Transformation SuccessDetermining Organizational Fit for Transformation Success
Determining Organizational Fit for Transformation Success
 
Process Mining and Predictive Process Monitoring in Apromore
Process Mining and Predictive Process Monitoring in ApromoreProcess Mining and Predictive Process Monitoring in Apromore
Process Mining and Predictive Process Monitoring in Apromore
 
BPMN 2.0 Fundamentals
BPMN 2.0 FundamentalsBPMN 2.0 Fundamentals
BPMN 2.0 Fundamentals
 

Andere mochten auch

Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
 Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
Yandex
 
Process Mining: Data Enabling Organisational Change
Process Mining: Data Enabling Organisational ChangeProcess Mining: Data Enabling Organisational Change
Process Mining: Data Enabling Organisational Change
Zbigniew Paszkiewicz
 
Petri nets by Barkatllah
Petri nets by BarkatllahPetri nets by Barkatllah
Petri nets by Barkatllah
Barkat Ullah
 

Andere mochten auch (20)

Process Mining - Chapter 2 - Process Modeling and Analysis
Process Mining - Chapter 2 - Process Modeling and AnalysisProcess Mining - Chapter 2 - Process Modeling and Analysis
Process Mining - Chapter 2 - Process Modeling and Analysis
 
Process Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniquesProcess Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniques
 
Process Mining - Chapter 9 - Operational Support
Process Mining - Chapter 9 - Operational SupportProcess Mining - Chapter 9 - Operational Support
Process Mining - Chapter 9 - Operational Support
 
Process Mining for ERP Systems
Process Mining for ERP SystemsProcess Mining for ERP Systems
Process Mining for ERP Systems
 
Process Mining - Chapter 5 - Process Discovery
Process Mining - Chapter 5 - Process DiscoveryProcess Mining - Chapter 5 - Process Discovery
Process Mining - Chapter 5 - Process Discovery
 
Process Mining Book
Process Mining BookProcess Mining Book
Process Mining Book
 
Process Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big DataProcess Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big Data
 
Process Mining - Chapter 4 - Getting the Data
Process Mining - Chapter 4 - Getting the DataProcess Mining - Chapter 4 - Getting the Data
Process Mining - Chapter 4 - Getting the Data
 
Process Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional PerspectivesProcess Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional Perspectives
 
Process Mining - Chapter 11 - Analyzing Lasagna Processes
Process Mining - Chapter 11 - Analyzing Lasagna ProcessesProcess Mining - Chapter 11 - Analyzing Lasagna Processes
Process Mining - Chapter 11 - Analyzing Lasagna Processes
 
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
 Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
 
Open Lecture Wil van der Aalst
Open Lecture Wil van der AalstOpen Lecture Wil van der Aalst
Open Lecture Wil van der Aalst
 
Process Mining with example
Process Mining with exampleProcess Mining with example
Process Mining with example
 
Process Mining: Data Enabling Organisational Change
Process Mining: Data Enabling Organisational ChangeProcess Mining: Data Enabling Organisational Change
Process Mining: Data Enabling Organisational Change
 
Enhancing medical evidence discovery through Interactive Pattern Recognition ...
Enhancing medical evidence discovery through Interactive Pattern Recognition ...Enhancing medical evidence discovery through Interactive Pattern Recognition ...
Enhancing medical evidence discovery through Interactive Pattern Recognition ...
 
SAP Process Mining by Celonis
SAP Process Mining by CelonisSAP Process Mining by Celonis
SAP Process Mining by Celonis
 
Process mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.comProcess mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.com
 
Ontologies And Process Mining
Ontologies And Process MiningOntologies And Process Mining
Ontologies And Process Mining
 
Building Information Model (BIM) based process mining
Building Information Model (BIM) based process miningBuilding Information Model (BIM) based process mining
Building Information Model (BIM) based process mining
 
Petri nets by Barkatllah
Petri nets by BarkatllahPetri nets by Barkatllah
Petri nets by Barkatllah
 

Ähnlich wie Process Mining - Chapter 1 - Introduction

Process mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checkingProcess mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checking
Muhammad Ajmal
 
Process mining chapter_09_operational_support
Process mining chapter_09_operational_supportProcess mining chapter_09_operational_support
Process mining chapter_09_operational_support
Muhammad Ajmal
 
Process mining chapter_14_epilogue
Process mining chapter_14_epilogueProcess mining chapter_14_epilogue
Process mining chapter_14_epilogue
Muhammad Ajmal
 
Process mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processesProcess mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processes
Muhammad Ajmal
 
Process mining chapter_06_advanced_process_discovery_techniques
Process mining chapter_06_advanced_process_discovery_techniquesProcess mining chapter_06_advanced_process_discovery_techniques
Process mining chapter_06_advanced_process_discovery_techniques
Muhammad Ajmal
 
Cost Based Performance Modelling
Cost Based Performance ModellingCost Based Performance Modelling
Cost Based Performance Modelling
Eugene Margulis
 
Intelligent Tutoring Systems: The DynaLearn Approach
Intelligent Tutoring Systems: The DynaLearn ApproachIntelligent Tutoring Systems: The DynaLearn Approach
Intelligent Tutoring Systems: The DynaLearn Approach
Wouter Beek
 
DevOps or: How I Learned to Stop Worrying and Love the Cloud
DevOps or: How I Learned to Stop Worrying and Love the CloudDevOps or: How I Learned to Stop Worrying and Love the Cloud
DevOps or: How I Learned to Stop Worrying and Love the Cloud
Hirokazu MORIKAWA
 
Process mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processesProcess mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processes
Muhammad Ajmal
 
Real-time Big Data Analytics: From Deployment to Production
Real-time Big Data Analytics: From Deployment to ProductionReal-time Big Data Analytics: From Deployment to Production
Real-time Big Data Analytics: From Deployment to Production
Revolution Analytics
 

Ähnlich wie Process Mining - Chapter 1 - Introduction (20)

Process mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checkingProcess mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checking
 
Process mining chapter_09_operational_support
Process mining chapter_09_operational_supportProcess mining chapter_09_operational_support
Process mining chapter_09_operational_support
 
Discovering Concurrency: Learning (Business) Process Models from Examples
Discovering Concurrency: Learning (Business) Process Models from ExamplesDiscovering Concurrency: Learning (Business) Process Models from Examples
Discovering Concurrency: Learning (Business) Process Models from Examples
 
Process Mining - Chapter 14 - Epilogue
Process Mining - Chapter 14 - EpilogueProcess Mining - Chapter 14 - Epilogue
Process Mining - Chapter 14 - Epilogue
 
Process mining chapter_14_epilogue
Process mining chapter_14_epilogueProcess mining chapter_14_epilogue
Process mining chapter_14_epilogue
 
Process mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processesProcess mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processes
 
Keynote Gartner Business Process Management Summit, February 2009, London
Keynote Gartner Business Process Management Summit, February 2009, London Keynote Gartner Business Process Management Summit, February 2009, London
Keynote Gartner Business Process Management Summit, February 2009, London
 
Semantic Complex Event Processing at Sem Tech 2010
Semantic Complex Event Processing at Sem Tech 2010Semantic Complex Event Processing at Sem Tech 2010
Semantic Complex Event Processing at Sem Tech 2010
 
Process mining chapter_06_advanced_process_discovery_techniques
Process mining chapter_06_advanced_process_discovery_techniquesProcess mining chapter_06_advanced_process_discovery_techniques
Process mining chapter_06_advanced_process_discovery_techniques
 
Configuration Management
Configuration Management Configuration Management
Configuration Management
 
Business processes, business rules, complex event processing, the JBoss way
Business processes, business rules, complex event processing, the JBoss wayBusiness processes, business rules, complex event processing, the JBoss way
Business processes, business rules, complex event processing, the JBoss way
 
Introduction to the BPM Lifecycle
Introduction to the BPM LifecycleIntroduction to the BPM Lifecycle
Introduction to the BPM Lifecycle
 
[IJET-V1I4P3] Authors :Mekhala
[IJET-V1I4P3] Authors :Mekhala[IJET-V1I4P3] Authors :Mekhala
[IJET-V1I4P3] Authors :Mekhala
 
Cost Based Performance Modelling
Cost Based Performance ModellingCost Based Performance Modelling
Cost Based Performance Modelling
 
Java Batch for Cost Optimized Efficiency
Java Batch for Cost Optimized EfficiencyJava Batch for Cost Optimized Efficiency
Java Batch for Cost Optimized Efficiency
 
Intelligent Tutoring Systems: The DynaLearn Approach
Intelligent Tutoring Systems: The DynaLearn ApproachIntelligent Tutoring Systems: The DynaLearn Approach
Intelligent Tutoring Systems: The DynaLearn Approach
 
DevOps or: How I Learned to Stop Worrying and Love the Cloud
DevOps or: How I Learned to Stop Worrying and Love the CloudDevOps or: How I Learned to Stop Worrying and Love the Cloud
DevOps or: How I Learned to Stop Worrying and Love the Cloud
 
Process mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processesProcess mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processes
 
Semantic Enterprise Architecture
Semantic Enterprise ArchitectureSemantic Enterprise Architecture
Semantic Enterprise Architecture
 
Real-time Big Data Analytics: From Deployment to Production
Real-time Big Data Analytics: From Deployment to ProductionReal-time Big Data Analytics: From Deployment to Production
Real-time Big Data Analytics: From Deployment to Production
 

Mehr von Wil van der Aalst

On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
Wil van der Aalst
 
A Decade of Business Process Management Conferences: Reflections on a Develop...
A Decade of Business Process Management Conferences: Reflections on a Develop...A Decade of Business Process Management Conferences: Reflections on a Develop...
A Decade of Business Process Management Conferences: Reflections on a Develop...
Wil van der Aalst
 
Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Wil van der Aalst
 
Distributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance CheckingDistributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance Checking
Wil van der Aalst
 

Mehr von Wil van der Aalst (18)

Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
 
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To AskEverything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
 
20 years of Process Mining Research (ICPM 2019 keynote)
20 years of Process Mining Research (ICPM 2019 keynote)20 years of Process Mining Research (ICPM 2019 keynote)
20 years of Process Mining Research (ICPM 2019 keynote)
 
Earth Movers’ Stochastic Conformance Checking
Earth Movers’ Stochastic Conformance CheckingEarth Movers’ Stochastic Conformance Checking
Earth Movers’ Stochastic Conformance Checking
 
Using Process Mining to Remove Operational Friction in Shared Services
Using Process Mining to Remove Operational Friction in Shared ServicesUsing Process Mining to Remove Operational Friction in Shared Services
Using Process Mining to Remove Operational Friction in Shared Services
 
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
 
Event Logs: What kind of data does process mining require?
Event Logs: What kind of data does process mining require?Event Logs: What kind of data does process mining require?
Event Logs: What kind of data does process mining require?
 
Configurable Declare: Designing Customizable Flexible Models
Configurable Declare: Designing Customizable Flexible ModelsConfigurable Declare: Designing Customizable Flexible Models
Configurable Declare: Designing Customizable Flexible Models
 
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
 
A Decade of Business Process Management Conferences: Reflections on a Develop...
A Decade of Business Process Management Conferences: Reflections on a Develop...A Decade of Business Process Management Conferences: Reflections on a Develop...
A Decade of Business Process Management Conferences: Reflections on a Develop...
 
Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...
 
Distributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance CheckingDistributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance Checking
 
Service Interaction: Patterns, Formalization, and Analysis
Service Interaction: Patterns, Formalization, and AnalysisService Interaction: Patterns, Formalization, and Analysis
Service Interaction: Patterns, Formalization, and Analysis
 
Keynote on Process Mining at SSCI 2010 / CIDM 2011
Keynote on Process Mining at SSCI 2010 / CIDM 2011Keynote on Process Mining at SSCI 2010 / CIDM 2011
Keynote on Process Mining at SSCI 2010 / CIDM 2011
 
Discovering Petri Nets: Evidence-Based Business Process Management
Discovering Petri Nets: Evidence-Based Business Process ManagementDiscovering Petri Nets: Evidence-Based Business Process Management
Discovering Petri Nets: Evidence-Based Business Process Management
 
TomTom for Business Process Managment (TomTom4BPM)
TomTom for Business Process Managment (TomTom4BPM)TomTom for Business Process Managment (TomTom4BPM)
TomTom for Business Process Managment (TomTom4BPM)
 
Keynote at 18th International Conference on Cooperative Information Systems (...
Keynote at 18th International Conference on Cooperative Information Systems (...Keynote at 18th International Conference on Cooperative Information Systems (...
Keynote at 18th International Conference on Cooperative Information Systems (...
 
Process Mining - Chapter 10 - Tool Support
Process Mining - Chapter 10 - Tool SupportProcess Mining - Chapter 10 - Tool Support
Process Mining - Chapter 10 - Tool Support
 

Kürzlich hochgeladen

Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 

Kürzlich hochgeladen (20)

(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 

Process Mining - Chapter 1 - Introduction

  • 1. Chapter 1 Introduction prof.dr.ir. Wil van der Aalst www.processmining.org
  • 2. Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Chapter 3 Process Modeling and Data Mining Analysis Part II: From Event Logs to Process Models Chapter 4 Chapter 5 Chapter 6 Getting the Data Process Discovery: An Advanced Process Introduction Discovery Techniques Part III: Beyond Process Discovery Chapter 7 Chapter 8 Chapter 9 Conformance Mining Additional Operational Support Checking Perspectives Part IV: Putting Process Mining to Work Chapter 10 Chapter 11 Chapter 12 Tool Support Analyzing “Lasagna Analyzing “Spaghetti Processes” Processes” Part V: Reflection Chapter 13 Chapter 14 Cartography and Epilogue Navigation PAGE 1
  • 3. Data explosion PAGE 2
  • 4. The World's Technological Capacity to Store, Communicate, and Compute Information by Martin Hilbert and Priscila López (DOI 10.1126/science.1200970) PAGE 3
  • 6. Example process model examine thoroughly c1 c3 pay compensation examine start register casually decide c5 end request c2 c4 reject check ticket request reinitiate request PAGE 5
  • 7. Same process in terms of BPMN rather than Petri nets examine thoroughly pay examine compensation casually register decide request start reject end check ticket request reinitiate request PAGE 6
  • 8. What are process models used for? • insight: while making a model, the modeler is triggered to view the process from various angles; • discussion: the stakeholders use models to structure discussions; • documentation: processes are documented for instructing people or certification purposes (cf. ISO 9000 quality management); • verification: process models are analyzed to find errors in systems or procedures (e.g., potential deadlocks); • performance analysis: techniques like simulation can be used to understand the factors influencing response times, service levels, etc.; • animation: models enable end users to “play out” different scenarios and thus provide feedback to the designer; • specification: models can be used to describe a PAIS before it is implemented and can hence serve as a “contract” between the developer and the end user/management; and • configuration: models can be used to configure a system. PAGE 7
  • 9. Limitations • Executable models may be used to force people to work in a particular manner. • However, most models are not well-aligned with reality. • Most hand-made models are disconnected from reality and provide only an idealized view on the processes at hand: “paper tigers”. • Given (a) the interest in process models, (b) the abundance of event data, and (c) the limited quality of hand-made models, it seems worthwhile to relate event data to process models: process mining! PAGE 8
  • 10. BPM life-cycle showing the classical uses of process models diagnosis/ requirements adjustment insight discussion performance animation analysis enactment/ (re)design monitoring data models verification documentation specification configuration/ implementation configuration PAGE 9
  • 11. The three main types of process mining: discovery, conformance, and enhancement supports/ “world” business controls processes software people machines system components organizations records events, e.g., messages, specifies transactions, models configures etc. analyzes implements analyzes discovery (process) event conformance model logs enhancement PAGE 10
  • 12. Orthogonal: Perspectives • The control-flow perspective focuses on the control- flow, i.e., the ordering of activities. • The organizational perspective focuses on information about resources hidden in the log, i.e., which actors (e.g., people, systems, roles, and departments) are involved and how are they related. • The case perspective focuses on properties of cases, e.g., cases can also be characterized by the values of the corresponding data elements. • The time perspective is concerned with the timing and frequency of events. PAGE 11
  • 13. Starting point: event log XES, MXML, SA-MXML, CSV, etc. PAGE 12
  • 14. Simplified event log a = register request, b = examine thoroughly, c = examine casually, d = check ticket, e = decide, f = reinitiate request, g = pay compensation, and h = reject request PAGE 13
  • 15. Process discovery b examine thoroughly g c1 c3 pay c compensation a examine e start register casually decide c5 end request h c2 d c4 reject check ticket request f reinitiate request PAGE 14
  • 16. Another example b c1 examine c3 thoroughly a e h start register decide c5 reject end request request d c2 check ticket c4 PAGE 15
  • 17. Beyond discovery: conformance and enhancement supports/ “world” business controls processes software people machines system components organizations records events, e.g., messages, specifies transactions, models configures etc. analyzes implements analyzes discovery (process) event conformance model logs enhancement PAGE 16
  • 18. Another event log b examine thoroughly g c1 c3 pay c compensation a examine e start register casually decide c5 end request h c2 d c4 reject check ticket request f reinitiate request PAGE 17
  • 19. Extension The event log can be used to discover roles in the organization (e.g., groups of people with similar work patterns). These roles can be Performance information (e.g., the used to relate individuals and average time between two activities. subsequent activities) can be extracted from the event log and visualized on top of the model. Role A: Role E: Role M: Assistant Expert Manager Decision rules (e.g., a decision tree based on data known at the time a Pete Sue Sara particular choice was made) can be learned from the event log and used Mike Sean to annotated decisions. Ellen E b A examine thoroughly A g A M c1 c3 pay c compensation a examine e A start register casually A decide c5 end request h c2 d c4 M reject check ticket request f reinitiate request PAGE 18
  • 20. Play-Out process model event log PAGE 19
  • 21. Play-In event log process model PAGE 20
  • 22. Replay • extended model showing times, frequencies, etc. • diagnostics • predictions • recommendations event log process model PAGE 21
  • 23. Replay • Connecting models to real events is crucial! • Possible uses: − Conformance checking − Repairing models − Extending the model with frequencies and temporal information − Constructing predictive models − Operational support (prediction, recommendation, etc.) PAGE 22
  • 24. Desire lines in process models PAGE 23
  • 25. Trends and terms • Business Process Management (BPM) • Business Intelligence (BI) • Online Analytical Processing (OLAP) • Business Activity Monitoring (BAM) • Complex Event Processing (CEP) • Corporate Performance Management (CPM) • Visual Analytics (VA) • Predictive Analytics (PA) • Continuous Process Improvement (CPI) • Total Quality Management (TQM) • Six Sigma PAGE 24
  • 26. Six Sigma • Six Sigma was originally developed by Motorola in the early 1980s. • DMAIC approach: − Define the problem and set targets, − Measure key performance indicators and collect data, − Analyze the data to investigate and verify cause-and- effect relationships, − Improve the current process based on this analysis, − Control the process to minimize deviations from the target. PAGE 25
  • 27. [μ-6σ, μ+6σ] with a 1.5σ shift A process that “runs at Six Sigma” has only 3.4 defective cases per million cases, i.e., on average 99.9997% of the cases is handled properly. PAGE 26
  • 28. Performance improvement versus compliance • Organizations are also putting more emphasis on corporate governance, risk, and compliance. • Scandals (Enron, Tyco, Adelphia, Peregrine, WorldCom, etc.) have fueled interest in more rigorous auditing practices. • New legislation such as the Sarbanes-Oxley Act (SOX) of 2002 and the Basel II Accord of 2004 emerged as a result. • Importance of verifying whether organizations operate “within their boundaries” is increasing. PAGE 27
  • 29. Outlook Chapter 1 Introduction Part I: Preliminaries Chapter 2 Chapter 3 Process Modeling and Data Mining Analysis Part II: From Event Logs to Process Models Chapter 4 Chapter 5 Chapter 6 Getting the Data Process Discovery: An Advanced Process Introduction Discovery Techniques Part III: Beyond Process Discovery Chapter 7 Chapter 8 Chapter 9 Conformance Mining Additional Operational Support Checking Perspectives Part IV: Putting Process Mining to Work Chapter 10 Chapter 11 Chapter 12 Tool Support Analyzing “Lasagna Analyzing “Spaghetti Processes” Processes” Part V: Reflection Chapter 13 Chapter 14 Cartography and Epilogue Navigation PAGE 28