You are on page 1of 7

Process mining

Process mining is a family of techniques relating the fields of data science and process management to
support the analysis of operational processes based on event logs. The goal of process mining is to turn
event data into insights and actions. Process mining is an integral part of data science, fueled by the
availability of event data and the desire to improve processes.[1] Process mining techniques use event data
to show what people, machines, and organizations are really doing. Process mining provides novel insights
that can be used to identify the execution paths taken by operational processes and address their
performance and compliance problems.

Process mining starts from event data. Input for process mining is an event log. An event log views a
process from a particular angle. Each event in the log should contain (1) a unique identifier for a particular
process instance (called case id), (2) an activity (description of the event that is occurring), and (3) a
timestamp. There may be additional event attributes referring to resources, costs, etc., but these are optional.
With some effort, such data can be extracted from any information system supporting operational processes.
Process mining uses these event data to answer a variety of process-related questions.[2]

There are three main classes of process mining techniques: process discovery, conformance checking, and
process enhancement. In the past terms like Workflow Mining and Automated Business Process Discovery
(ABPD)[3] were used.

Overview
Process mining techniques are often used when no formal description of the process can be obtained by
other approaches, or when the quality of existing documentation is questionable.[4] For example,
application of process mining methodology to the audit trails of a workflow management system, the
transaction logs of an enterprise resource planning system, or the electronic patient records in a hospital can
result in models describing processes of organizations.[5] Event log analysis can also be used to compare
event logs with prior model(s) to understand whether the observations conform to a prescriptive or
descriptive model. It is required that the event logs data be linked to a case ID, activities, and
timestamps.[6][7]

Contemporary management trends such as BAM (Business Activity Monitoring), BOM (Business
Operations Management), and BPI (business process intelligence) illustrate the interest in supporting
diagnosis functionality in the context of Business Process Management technology (e.g., Workflow
Management Systems and other process-aware information systems). Process mining is different from
mainstream machine learning, data mining, and artificial intelligence techniques. For example, process
discovery techniques in the field of process mining try to discover end-to-end process models that are able
to describe sequential, choice relation, concurrent and loop behavior. Conformance checking techniques are
closer to optimization than to traditional learning approaches. However, process mining can be used to
generate machine learning, data mining, and artificial intelligence problems. After discovering a process
model and aligning the event log, it is possible to create basic supervised and unsupervised learning
problems. For example, to predict the remaining processing time of a running case or to identify the root
causes of compliance problems.

The IEEE Task Force on Process Mining was established in October 2009 as part of the IEEE
Computational Intelligence Society.[8] This is a vendor-neutral organization aims to promote the research,
development, education and understanding of process mining, make end-users, developers, consultants, and
researchers aware of the state-of-the-art in process mining, promote the use of process mining techniques
and tools and stimulate new applications, play a role in standardization efforts for logging event data (e.g.,
XES), organize tutorials, special sessions, workshops, competitions, panels, and develop material (papers,
books, online courses, movies, etc.) to inform and guide people new to the field. The IEEE Task Force on
Process Mining established the International Process Mining Conference (ICPM) series,[9] lead the
development of the IEEE XES standard for storing and exchanging event data [10] [11], and wrote the
Process Mining Manifesto[12] which was translated into 16 languages.

History and place in data science


The term "Process mining" was first coined in a research proposal written by the Dutch computer scientist
Wil van der Aalst. Thus began a new field of research that emerged under the umbrella of techniques
related to data science and process science at the Eindhoven University in 1999. In the early days, process
mining techniques were often convoluted with the techniques used for workflow management. In the year
2000, the very first practically applicable algorithm for process discovery, "Alpha miner" was developed.
The very next year, in 2001, a much similar algorithm based on heuristics called "Heuristic miner (https://w
ww.researchgate.net/publication/229124308_Process_Mining_with_the_Heuristics_Miner-algorithm)" was
introduced in the research papers. Further along the link more powerful algorithms such as inductive miner
were developed for process discovery. As the field of process mining began to evolve, conformance
checking became an integral part of it. The year 2004 earmarked the development of "Token-based replay"
for conformance checking purposes. Apart from the mainstream techniques of process discovery and
conformance checking, process mining branched out into multiple areas leading to the discovery and
development of "Performance analysis", "Decision mining (https://www.researchgate.net/publication/2215
85988_Decision_Mining_in_ProM)" and "Organizational mining" in the year 2005 and 2006 respectively.
In the year 2007, the first-ever commercial process mining company "Futura Pi" was established. The
"IEEE task force on PM (https://www.tf-pm.org/)", a governing body was formed in the year 2009 that
began to overlook the norms and standards related to process mining. Further techniques were developed
for conformance checking which led to the publishing of "Alignment-based conformance checking (https://
link.springer.com/chapter/10.1007/978-3-662-45563-0_1)" in the year 2010. In 2011, the first-ever Process
mining book was published. Further along in 2014, a MOOC course was offered by Coursera on Process
mining. By the year 2018, nearly 30+ commercially available process mining tools were in the picture. The
year 2019 earmarked the first Process mining conference. Today we have over 35 vendors offering tools
and techniques for process discovery and conformance checking.

Process mining should be viewed as a bridge between data science and process science. Process mining
focuses on transforming event log into a meaningful representation of the process which can lead to the
formation of several data science and machine learning related problems.

Categories
There are three categories of process mining techniques.

Process Discovery: The first step in process mining. The main goal of process discovery is
to transform the event log into a process model. An event log can come from any data
storage system that records the activities in an organisation along with the timestamps for
those activities. Such an event log is required to contain a case id (a unique identifier to
recognise the case to which activity belongs), activity description (a textual description of the
activity executed), and timestamp of the activity execution. The result of process discovery is
generally a process model which is representative of the event log. Such a process model
can be discovered, for example, using techniques such as alpha algorithm (a didactically
driven approach), heuristic miner (https://www.researchgate.net/publication/229124308_Pro
cess_Mining_with_the_Heuristics_Miner-algorithm), or inductive miner.[13] Many
established techniques exist for automatically constructing process models (for example,
Petri nets, BPMN diagrams, activity diagrams, State diagrams, and EPCs) based on an
event log.[13][14][15][16][17] Recently, process mining research has started targeting other
perspectives (e.g., data, resources, time, etc.). One example is the technique described in
(Aalst, Reijers, & Song, 2005),[18] which can be used to construct a social network.
Nowadays, techniques such as "streaming process mining" are being developed to work
with continuous online data that has to be processed on the spot.
Conformance checking: Helps in comparing an event log with an existing process model
to analyse the discrepancies between them. Such a process model can be constructed
manually or with the help of a discovery algorithm. For example, a process model may
indicate that purchase orders of more than 1 million euros require two checks. Another
example is the checking of the so-called "four-eyes" principle. Conformance checking may
be used to detect deviations (compliance checking), or evaluate the discovery algorithms, or
enrich an existing process model. An example is the extension of a process model with
performance data, i.e., some a priori process model is used to project the potential
bottlenecks. Another example is the decision miner described in (Rozinat & Aalst,
2006b),[19] which takes an a priori process model and analyses every choice in the process
model. The event log is consulted for each option to see which information is typically
available the moment the choice is made. Conformance checking has various techniques
such as "token-based replay", "streaming conformance checking" that are used depending
on the system needs.Then classical data mining techniques are used to see which data
elements influence the choice. As a result, a decision tree is generated for each choice in
the process.
Performance Analysis: Used when there is an a priori model. The model is extended with
additional performance information such as processing times, cycle times, waiting times,
costs, etc., so that the goal is not to check conformance, but rather to improve the
performance of the existing model with respect to certain process performance measures. An
example is the extension of a process model with performance data, i.e., some prior process
model dynamically annotated with performance data. It is also possible to extend process
models with additional information such as decision rules and organisational information
(e.g., roles).

Process mining software


Process mining software helps organizations analyze and visualize their business processes based on data
extracted from various sources, such as transaction logs or event data. This software can identify patterns,
bottlenecks, and inefficiencies within a process, enabling organizations to improve their operational
efficiency, reduce costs, and enhance their customer experience.

In March 2023 The Analytics Insight Magazine identified top 5 process mining software companies for
2023:[20]

1. Celonis
2. UiPath Process Mining
3. SAP Signavio Process Intelligence
4. Software AG ARIS Process Mining
5. ABBYY Timeline

See also
Business Process Management
Process Discovery
Conformance Checking
Workflow Management
Machine Learning
Data Science
Sequence mining
Data mining
Intention mining
Data visualization
Process analysis

References
1. van der Aalst, Wil (2016). Process Mining: Data Science in Action (https://www.springer.com/
de/book/9783662498507).
2. van der Aalst, Wil (2011). Process Mining: Data Science in Action (https://www.springer.com/
de/book/9783662498507).
3. "Automated Business Process Discovery (ABPD)" (http://www.gartner.com/it-glossary/autom
ated-business-process-discovery-abpd). Gartner.com. Gartner, Inc. 2015. Retrieved
6 January 2015.Gartner Definition (http://www.gartner.com/it-glossary/automated-business-p
rocess-discovery-abpd).
4. "Gartner Top 10 Strategic Technology Trends for 2020" (https://www.gartner.com/smarterwith
gartner/gartner-top-10-strategic-technology-trends-for-2020/). Gartner.
5. Kirchmer, M., Laengle, S., & Masias, V. (2013). Transparency-Driven Business Process
Management in Healthcare Settings [Leading Edge]. Technology and Society Magazine,
IEEE, 32(4), 14-16. (http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=
6679328)
6. Luis M. Camarinha-Matos, Frederick Benaben, Willy Picard (2015). Risks and Resilience of
Collaborative Networks (https://books.google.com/books?id=DZ-oCgAAQBAJ&dq=process
+mining+%22case+id%22+activity+timestamp&pg=PA502)
7. Symeon Christodoulou, Raimar Scherer (2016). eWork and eBusiness in Architecture,
Engineering and Construction: ECPPM 2016 (https://books.google.com/books?id=O8uEDg
AAQBAJ&dq=process+mining+%22case+id%22+activity+timestamp&pg=PA483)
8. "IEEE Task Force on Process Mining" (https://www.tf-pm.org/). Home page of the task force
on process mining. IEEE Task Force on Process Mining. Retrieved 10 January 2021.
9. "International Process Mining Conference (ICPM) series" (https://icpmconference.org).
Home page of the ICPM conference series. IEEE Task Force on Process Mining. Retrieved
10 January 2021.
10. IEEE Standard for eXtensible Event Stream (XES) for Achieving Interoperability in Event
Logs and Event Streams (https://ieeexplore.ieee.org/document/7740858). IEEE Standard for
eXtensible Event Stream (XES). ieee. 11 November 2016.
doi:10.1109/IEEESTD.2016.7740858 (https://doi.org/10.1109%2FIEEESTD.2016.7740858).
ISBN 978-1-5044-2421-9. Retrieved 10 January 2021.
11. "eXtensible Event Stream (XES)" (http://xes-standard.org/). eXtensible Event Stream (XES).
IEEE Task Force on Process Mining. 11 November 2016. Retrieved 10 January 2021.
12. "Process Mining Manifesto" (https://www.tf-pm.org/resources/manifesto). Process Mining
Manifesto. IEEE Task Force on Process Mining. 2011. Retrieved 10 January 2021.
13. Aalst, W. van der, Weijters, A., & Maruster, L. (2004). Workflow Mining: Discovering Process
Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering, 16 (9),
1128–1142.
14. Agrawal, R., Gunopulos, D., & Leymann, F. (1998). Mining Process Models from Workflow
Logs. In Sixth international conference on extending database technology (pp. 469–483).
15. Cook, J., & Wolf, A. (1998). Discovering Models of Software Processes from Event-Based
Data. ACM Transactions on Software Engineering and Methodology, 7 (3), 215–249.
16. Datta, A. (1998). Automating the Discovery of As-Is Business Process Models: Probabilistic
and Algorithmic Approaches. Information Systems Research, 9 (3), 275–301.
17. Weijters, A., & Aalst, W. van der (2003). Rediscovering Workflow Models from Event-Based
Data using Little Thumb. Integrated Computer-Aided Engineering, 10 (2), 151–162.
18. Aalst, W. van der, Beer, H., & Dongen, B. van (2005). Process Mining and Verification of
Properties: An Approach based on Temporal Logic. In R. Meersman & Z. T. et al. (Eds.), On
the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE: OTM
Confederated International Conferences, CoopIS, DOA, and ODBASE 2005 (Vol. 3760, pp.
130–147). Springer-Verlag, Berlin.
19. Rozinat, A., & Aalst, W. van der (2006a). Conformance Testing: Measuring the Fit and
Appropriateness of Event Logs and Process Models. In C. Bussler et al. (Ed.), BPM 2005
Workshops (Workshop on Business Process Intelligence) (Vol. 3812, pp. 163–176).
Springer-Verlag, Berlin.
20. Zaveria (2023-03-26). "Top 5 Process Mining Software Companies for 2023" (https://www.an
alyticsinsight.net/top-5-process-mining-software-companies-for-2023/). The Analytics
Insight. Retrieved 2023-05-05.

Further reading
Aalst, W. van der (2016). Process Mining: Data Science in Action. Springer Verlag, Berlin
(ISBN 978-3-662-49850-7).
Reinkemeyer, L. (2020). Process Mining in Action: Principles, Use Cases and Outlook.
Springer Verlag, Berlin (ISBN 978-3-030-40171-9).
Carmona, J., van Dongen, B.F., Solti, A., Weidlich, M. (2018). Conformance Checking:
Relating Processes and Models. Springer Verlag, Berlin (ISBN 978-3-319-99413-0).
Aalst, W. van der (2011). Process Mining: Discovery, Conformance and Enhancement of
Business Processes. Springer Verlag, Berlin (ISBN 978-3-642-19344-6).
Aalst, W. van der, Dongen, B. van, Herbst, J., Maruster, L., Schimm, G., & Weijters, A. (2003).
Workflow Mining: A Survey of Issues and Approaches. Data and Knowledge Engineering, 47
(2), 237–267.
Aalst, W. van der, Reijers, H., & Song, M. (2005). Discovering Social Networks from Event
Logs. Computer Supported Cooperative work, 14 (6), 549–593.
Jans, M., van der Werf, J.M., Lybaert, N., Vanhoof, K. (2011) A business process mining
application for internal transaction fraud mitigation, Expert Systems with Applications, 38
(10), 13351–13359
Dongen, B. van, Medeiros, A., Verbeek, H., Weijters, A., & Aalst, W. van der (2005). The
ProM framework: A New Era in Process Mining Tool Support. In G. Ciardo & P. Darondeau
(Eds.), Application and Theory of Petri Nets 2005 (Vol. 3536, pp. 444–454). Springer-Verlag,
Berlin.
Aalst, W. van der. A Practitioner's Guide to Process Mining: Limitations of the Directly-
Follows Graph. In International Conference on Enterprise Information Systems (Centeris
2019), volume 164 of Procedia Computer Science, pages 321-328. Elsevier, 2019.
Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., & Shan, M. (2004). Business
Process Intelligence. Computers in Industry, 53 (3), 321–343.
Grigori, D., Casati, F., Dayal, U., & Shan, M. (2001). Improving Business Process Quality
through Exception Understanding, Prediction, and Prevention. In P. Apers, P. Atzeni, S. Ceri,
S. Paraboschi, K. Ramamohanarao, & R. Snodgrass (Eds.), Proceedings of 27th
international conference on Very Large Data Bases (VLDB’01) (pp. 159–168). Morgan
Kaufmann.
IDS Scheer. (2002). ARIS Process Performance Manager (ARIS PPM): Measure, Analyze
and Optimize Your Business Process Performance (whitepaper).
Ingvaldsen, J.E., & J.A. Gulla. (2006). Model Based Business Process Mining. Journal of
Information Systems Management, Vol. 23, No. 1, Special Issue on Business Intelligence,
Auerbach Publications
Kirchmer, M., Laengle, S., & Masias, V. (2013). Transparency-Driven Business Process
Management in Healthcare Settings [Leading Edge]. Technology and Society Magazine,
IEEE, 32(4), 14-16.
zur Muehlen, M. (2004). Workflow-based Process Controlling: Foundation, Design and
Application of workflow-driven Process Information Systems. Logos, Berlin.
zur Muehlen, M., & Rosemann, M. (2000). Workflow-based Process Monitoring and
Controlling – Technical and Organizational Issues. In R. Sprague (Ed.), Proceedings of the
33rd Hawaii international conference on system science (HICSS-33) (pp. 1–10). IEEE
Computer Society Press, Los Alamitos, California.
Rozinat, A., & Aalst, W. van der (2006b). Decision Mining in ProM. In S. Dustdar, J. Faideiro,
& A. Sheth (Eds.), International Conference on Business Process Management (BPM 2006)
(Vol. 4102, pp. 420–425). Springer-Verlag, Berlin.
Sayal, M., Casati, F., Dayal, U., & Shan, M. (2002). Business Process Cockpit. In
Proceedings of 28th international conference on very large data bases (VLDB’02) (pp. 880–
883). Morgan Kaufmann.
Huser V, Starren JB, EHR Data Pre-processing Facilitating Process Mining: an Application
to Chronic Kidney Disease. AMIA Annu Symp Proc 2009 link (https://independent.academia.
edu/VojtechHuser/Papers/990979/EHR_Data_Pre-processing_Facilitating_Process_Mining
_an_Application_to_Chronic_Kidney_Disease)
Ross-Talbot S, The importance and potential of descriptions to our industry. Keynote at The
10th International Federated Conference on Distributed Computing Techniques [1] (http://dis
cotec2015.inria.fr/workshops/ice-2015/)
Garcia, Cleiton dos Santos; Meincheim, Alex; et al. (2019). Process mining techniques and
applications – A systematic mapping study». Expert Systems with Applications. 133: 260–
295. ISSN 0957-4174. doi:10.1016/j.eswa.2019.05.003 [2] (https://www.sciencedirect.com/s
cience/article/abs/pii/S0957417419303161)
van der Aalst, W.M.P. and Berti A. Discovering Object-Centric Petri Nets. Fundamenta
Informaticae, 175(1-4):1-40, 2020. doi:10.3233/FI-2020-1946 [3] (https://content.iospress.co
m/articles/fundamenta-informaticae/fi1946)

External links
International Process Mining Conference (https://icpmconference.org) is the annual
international process mining conference organized by the IEEE Task Force on Process
Mining.
Process mining research (http://www.processmining.org) at Eindhoven University of
Technology, the Netherlands.
Process mining research (http://www.janclaes.info/bpm.php) at Ghent University, Belgium.
Process mining research (http://www.processmining.it) at University of Padua, Italy.

Retrieved from "https://en.wikipedia.org/w/index.php?title=Process_mining&oldid=1153455918"

You might also like