Skip to main content
  • 205k Accesses

Abstract

It is a central idea of BPM that processes are explicitly defined, then executed, and that information about process execution is prepared and analyzed. In this way, this information provides a feedback loop on how the process might be redesigned. Data about the execution of processes can stem from BPMSs in which processes are specified, but also from systems that do not work with an explicit process model, for instance ERP systems or ticketing systems. Data from those systems have to be transformed to meet the requirements of intelligent process execution analysis. This field is typically referred to as process mining.

This chapter deals with intelligently using the data generated from the execution of the process. We refer to such data as event logs, covering what has been done when by whom in relation to which process instance. First, we investigate the structure of event logs, their relationship to process models, and their usefulness for process monitoring and controlling. Afterwards, we discuss three major objectives of intelligent process analysis, namely transparency, performance and conformance. We discuss automatic process discovery as a technical step to achieve transparency of how the process is executed in reality. Then, we study how the analysis of event logs can provide insights into process performance. Finally, we discuss how the conformance between event logs and a process model can be checked.

If you can’t measure something, you can’t understand it. If you can’t understand it, you can’t control it. If you can’t control it, you can’t improve it.

H. James Harrington (1929–)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    For simplicity, we only consider one supplier in this example.

  2. 2.

    The software is available at http://www.promtools.org.

  3. 3.

    Note that the α-algorithm was originally defined for constructing Petri nets. The version shown here is a simplification based on the five simple control flow patterns of Fig. 10.5 in order to construct BPMN models.

References

  1. R. Anupindi, S. Chopra, S.D. Deshmukh, J.A. van Mieghem, E. Zemel, Managing Business Process Flows (Prentice Hall, New York, 1999)

    Google Scholar 

  2. J. De Weerdt, M. De Backer, J. Vanthienen, B. Baesens, A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs. Inf. Syst. 37(7), 654–676 (2012)

    Article  Google Scholar 

  3. S. Goedertier, J. De Weerdt, D. Martens, J. Vanthienen, B. Baesens, Process discovery in event logs: an application in the telecom industry. Appl. Soft Comput. 11(2), 1697–1710 (2011)

    Article  Google Scholar 

  4. C. Günther, Process mining in flexible environments. PhD thesis, Technische Universiteit Eindhoven (2009)

    Google Scholar 

  5. P. Harmon, Analyzing activities. BPTrends Newsletter 1(4), April 2003. http://www.bptrends.com

  6. D. Heckl, J. Moormann, Process performance management, in Handbook on Business Process Management 2 (Springer, Berlin, 2010), pp. 115–135

    Chapter  Google Scholar 

  7. IEEE TaskForce on Process Mining. Process mining manifesto. http://www.win.tue.nl/ieeetfpm/doku.php?id=shared:process_mining_manifesto. Accessed: November 2012

  8. M. Strembeck, J. Mendling, Modeling process-related rbac models with extended uml activity models. Inf. Softw. Technol. 53(5), 456–483 (2011)

    Article  Google Scholar 

  9. W.M.P. van der Aalst, Process Mining—Discovery, Conformance and Enhancement of Business Processes (Springer, Berlin, 2011)

    MATH  Google Scholar 

  10. W.M.P. van der Aalst, H.A. Reijers, A.J.M.M. Weijters, B.F. van Dongen, A.K. Alves de Medeiros, M. Song, H.M.W.(E.) Verbeek, Business process mining: an industrial application. Inf. Syst. 32(5), 713–732 (2007)

    Article  Google Scholar 

  11. J. vom Brocke, M. Rosemann, Handbook on Business Process Management 1: Introduction, Methods, and Information Systems, vol. 1 (Springer, Berlin, 2010)

    Google Scholar 

  12. J. vom Brocke, M. Rosemann, Handbook on Business Process Management 2: Strategic Alignment, Governance, People and Culture, vol. 2 (Springer, Berlin, 2010)

    Book  Google Scholar 

  13. M. Weidlich, A. Polyvyanyy, N. Desai, J. Mendling, M. Weske, Process compliance analysis based on behavioural profiles. Inf. Syst. 36(7), 1009–1025 (2011)

    Article  Google Scholar 

  14. M. Weidlich, H. Ziekow, J. Mendling, O. Günther, M. Weske, N. Desai, Event-based monitoring of process execution violations, in Business Process Management—9th International Conference, BPM 2011, Proceedings, Clermont-Ferrand, France, August 30–September 2, 2011, ed. by S. Rinderle-Ma, F. Toumani, K. Wolf. Lecture Notes in Computer Science, vol. 6896 (Springer, Berlin, 2011), pp. 182–198

    Google Scholar 

  15. M. zur Muehlen, Workflow-Based Process Controlling. Foundation, Design, and Implementation of Workflow-Driven Process Information Systems. Advances in Information Systems and Management Science, vol. 6 (Logos, Berlin, 2004)

    Google Scholar 

  16. M. zur Muehlen, R. Shapiro, Business process analytics, in Handbook on Business Process Management 2 (2010), pp. 137–157

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A. (2013). Process Intelligence. In: Fundamentals of Business Process Management. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33143-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33143-5_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33142-8

  • Online ISBN: 978-3-642-33143-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics