skip to main content
research-article

Process Mining: Overview and Opportunities

Published:01 July 2012Publication History
Skip Abstract Section

Abstract

Over the last decade, process mining emerged as a new research field that focuses on the analysis of processes using event data. Classical data mining techniques such as classification, clustering, regression, association rule learning, and sequence/episode mining do not focus on business process models and are often only used to analyze a specific step in the overall process. Process mining focuses on end-to-end processes and is possible because of the growing availability of event data and new process discovery and conformance checking techniques.

Process models are used for analysis (e.g., simulation and verification) and enactment by BPM/WFM systems. Previously, process models were typically made by hand without using event data. However, activities executed by people, machines, and software leave trails in so-called event logs. Process mining techniques use such logs to discover, analyze, and improve business processes.

Recently, the Task Force on Process Mining released the Process Mining Manifesto. This manifesto is supported by 53 organizations and 77 process mining experts contributed to it. The active involvement of end-users, tool vendors, consultants, analysts, and researchers illustrates the growing significance of process mining as a bridge between data mining and business process modeling. The practical relevance of process mining and the interesting scientific challenges make process mining one of the “hot” topics in Business Process Management (BPM). This article introduces process mining as a new research field and summarizes the guiding principles and challenges described in the manifesto.

References

  1. Adriansyah, A., van Dongen, B., and van der Aalst, W. 2011. Conformance checking using cost-based fitness analysis. In Proceedings of the IEEE International Enterprise Computing Conference (EDOC’11). C. Chi and P. Johnson Eds., IEEE Computer Society, 55--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Agrawal, R., Gunopulos, D., and Leymann, F. 1998. Mining process models from workflow logs. In Proceedings of the 6th International Conference on Extending Database Technology. Lecture Notes in Computer Science, vol. 1377, Springer-Verlag, Berlin, 469--483. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bergenthum, R., Desel, J., Lorenz, R., and Mauser, S. 2007. Process mining based on regions of languages. In Proceedings of the International Conference on Business Process Management (BPM’07). G. Alonso, P. Dadam, and M. Rosemann Eds., Lecture Notes in Computer Science, vol. 4714, Springer, 375--383. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bose, R. P. J. C., van der Aalst, W., Zliobaite, I., and Pechenizkiy, M. 2011. Handling concept drift in process mining. In Proceedings of the International Conference on Advanced Information Systems Engineering (CAISE’11). H. Mouratidis and C. Rolland Eds., Lecture Notes in Computer Science, vol. 6741, Springer, 391--405. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cook, J. and Wolf, A. 1998. Discovering models of software processes from event-based data. ACM Trans. Softw. Engin. Method. 7, 3, 215--249. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cortadella, J., Kishinevsky, M., Lavagno, L., and Yakovlev, A. 1998. Deriving Petri nets from finite transition systems. IEEE Trans. Comput. 47, 8, 859--882. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Datta, A. 1998. Automating the discovery of as-is business process models: Probabilistic and algorithmic approaches. Inf. Syst. Resear. 9, 3, 275--301. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Desel, J. and Reisig, W. 1998. Place/Transition Nets. In Lectures on Petri Nets I: Basic Models, W. Reisig and G. Rozenberg Eds., Lecture Notes in Computer Science, vol. 1491, Springer-Verlag, Berlin, 122--173.Google ScholarGoogle Scholar
  9. Ehrenfeucht, A. and Rozenberg, G. 1989. Partial (set) 2-structures: Parts 1 Part 2. Acta Informatica 27, 4, 315--368.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Greco, G., Guzzo, A., Pontieri, L., and Saccà, D. 2006. Discovering expressive process models by clustering log traces. IEEE Trans. Knowl. Data Engin. 18, 8, 1010--1027. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Günther, C. and van der Aalst, W. 2007. Fuzzy mining: Adaptive process simplification based on multi-perspective metrics. In Proceedings of the International Conference on Business Process Management (BPM’07). G. Alonso, P. Dadam, and M. Rosemann Eds., Lecture Notes in Computer Science, vol. 4714, Springer-Verlag, Berlin, 328--343. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hand, D., Mannila, H., and Smyth, P. 2001. Principles of Data Mining. MIT Press, Cambridge, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Herbst, J. 2000. A machine learning approach to workflow management. In Proceedings of the 11th European Conference on Machine Learning. Lecture Notes in Computer Science, vol. 1810, Springer, 183--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., and Byers, A. 2011. Big Data: The Next Frontier for Innovation, Competition, and Productivity. McKinsey Global Institute.Google ScholarGoogle Scholar
  15. Medeiros, A., Weijters, A., and van der Aalst, W. 2007. Genetic process mining: An experimental evaluation. Data Mining Knowl. Discov. 14, 2, 245--304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Munoz-Gama, J. and Carmona, J. 2011. Enhancing precision in process conformance: Stability, confidence and severity. In Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining (CIDM’11). N. Chawla, I. King, and A. Sperduti Eds., IEEE.Google ScholarGoogle Scholar
  17. Rozinat, A. and van der Aalst, W. 2006. Decision mining in ProM. In Proceedings of the International Conference on Business Process Management (BPM’06). S. Dustdar, J. Fiadeiro, and A. Sheth Eds., Lecture Notes in Computer Science, vol. 4102, Springer, 420--425. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Rozinat, A. and van der Aalst, W. 2008. Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33, 1, 64--95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Sole, M. and Carmona, J. 2010. Process mining from a basis of regions. In Applications and Theory of Petri Nets 2010. J. Lilius and W. Penczek Eds., Lecture Notes in Computer Science, vol. 6128, Springer 226--245. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Song, M. and van der Aalst, W. 2008. Towards comprehensive support for organizational mining. Dec. Support Syst. 46, 1, 300--317. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. TFPM -- IEEE Task Force On Process Mining. 2011. Process mining manifesto. In Proceedings of the BPM Workshops. Lecture Notes in Business Information Processing Series, vol. 99, Springer.Google ScholarGoogle Scholar
  22. van der Aalst, W. 2011. Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer. Google ScholarGoogle ScholarCross RefCross Ref
  23. van der Aalst, W. and Stahl, C. 2011. Modeling Business Processes: A Petri Net Oriented Approach. MIT Press, Cambridge, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. van der Aalst, W., van Dongen, B., Herbst, J., Maruster, L., Schimm, G., and Weijters, A. 2003. Workflow mining: A survey of issues and approaches. Data Knowl. Engin. 47, 2, 237--267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. van der Aalst, W., Weijters, A., and Maruster, L. 2004. Workflow mining: Discovering process models from event logs. IEEE Trans. Knowl. Data Engin. 16, 9, 1128--1142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. van der Aalst, W., Reijers, H., Weijters, A., van Dongen, B., Medeiros, A., Song, M., and Verbeek, H. 2007. Business process mining: An industrial application. Inf. Syst. 32, 5, 713--732. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. van der Aalst, W., Rubin, V., Verbeek, H., van Dongen, B., Kindler, E., and Günther, C. 2010. Process mining: A two-step approach to balance between underfitting and overfitting. Softw. Syst. Model. 9, 1, 87--111.Google ScholarGoogle ScholarCross RefCross Ref
  28. van der Aalst, W., van Hee, K., Hofstede, A., Sidorova, N., Verbeek, H., Voorhoeve, M., and Wynn, M. 2011a. Soundness of workflow nets: Classification, decidability, and analysis. Formal Asp. Comput. 23, 3, 333--363. Google ScholarGoogle ScholarCross RefCross Ref
  29. van der Aalst, W., Schonenberg, M., and Song, M. 2011b. Time prediction based on process mining. Inf. Syst. 36, 2, 450--475. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. van der Aalst, W., Adriansyah, A., and van Dongen, B. 2012. Replaying history on process models for conformance checking and performance analysis. WIREs Data Mining Knowl. Discov. 2, 2, 182--192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. van Dongen, B. and van der Aalst, W. 2004. Multi-phase process mining: Building instance graphs. In Proceedings of the International Conference on Conceptual Modeling (ER’04). P. Atzeni, W. Chu, H. Lu, S. Zhou, and T. Ling Eds., Lecture Notes in Computer Science, vol. 3288, Springer, 362--376.Google ScholarGoogle Scholar
  32. van Dongen, B. and van der Aalst, W. 2005. Multi-phase mining: Aggregating instances graphs into EPCs and Petri nets. In Proceedings of the 2nd International Workshop on Applications of Petri Nets to Coordination, Workflow and Business Process Management. D. Marinescu Ed., 35--58.Google ScholarGoogle Scholar
  33. van Dongen, B., Busi, N., Pinna, G., and van der Aalst, W. 2007. An iterative algorithm for applying the theory of regions in process mining. In Proceedings of the Workshop on Formal Approaches to Business Processes and Web Services (FABPWS’07). W. Reisig, K. Hee, and K. Wolf Eds., Publishing House of University of Podlasie, Siedlce, Poland, 36--55.Google ScholarGoogle Scholar
  34. Verbeek, H., Buijs, J., van Dongen, B., and van der Aalst, W. 2010. ProM 6: The process mining toolkit. In Proceedings of BPM Demonstration Track 2010. M. L. Rosa Ed., CEUR Workshop Proceedings Series, vol. 615, 34--39.Google ScholarGoogle Scholar
  35. Weijters, A. and van der Aalst, W. 2003. Rediscovering workflow models from event-based data using Little Thumb. Integr. Comput.-Aid. Engin. 10, 2, 151--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Werf, J., Dongen, B. van, Hurkens, C., and Serebrenik, A. 2010. Process discovery using integer linear programming. Fundamenta Informaticae 94, 387--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Weske, M. 2007. Business Process Management: Concepts, Languages, Architectures. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Process Mining: Overview and Opportunities

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Management Information Systems
      ACM Transactions on Management Information Systems  Volume 3, Issue 2
      July 2012
      121 pages
      ISSN:2158-656X
      EISSN:2158-6578
      DOI:10.1145/2229156
      Issue’s Table of Contents

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 July 2012
      • Revised: 1 January 2012
      • Accepted: 1 January 2012
      • Received: 1 October 2011
      Published in tmis Volume 3, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader