Information Systems Frontiers

, Volume 13, Issue 3, pp 371–380

A process mining based approach to knowledge maintenance

Article

Abstract

The quality of knowledge in the knowledge repository determines the effect of knowledge reusing and sharing. Knowledge to be reused should be checked in advance through a knowledge maintenance process. The knowledge maintenance process model is difficult to be constructed because of the balance between the efficiency and the effect. In this paper, process mining is applied to analyze the knowledge maintenance logs to discover process and then construct a more appropriate knowledge maintenance process model. We analyze knowledge maintenance logs from the control flow perspective to find a good characterization of knowledge maintenance tasks and dependencies. In addition, the logs are analyzed from the organizational perspective to cluster the performers who are qualified to do the same kinds of tasks and to get the relations among these clusters. The proposed approach has been applied in the knowledge management system. The result of the experiment shows that our approach is feasible and efficient.

Keywords

Knowledge maintenance Knowledge management Process mining Process mining 

References

  1. Agrawal, R., Gunopulos, D., & Leymann, F. (1998). Mining process models from workflow logs. Paper presented at the Proceedings of the Sixth International Conference on Extending Database Technology, Valencia, Spain.Google Scholar
  2. Alavi, M., & Leidner, D. E. (2001). Review: knowledge management and knowledge management systems: conceptual foundations and research issues. MIS Quarterly, 25(1), 107–136.CrossRefGoogle Scholar
  3. Bohn, R. (1994). Measuring and Managing Technological Knowledge. Sloan Management Review, 61–73.Google Scholar
  4. Cabac, L., & Denz, N. (2008). Net Components for the Integration of Process Mining into Agent-Oriented Software Engineering. In Jensen Kurt, W. M. P. van der Aalst, & B. Jonathan (Eds.), Transactions on Petri Nets and Other Models of Concurrency I, Lecture Notes in Computer Science, vol. 5100 (pp. 86–103). Berlin: Springer.CrossRefGoogle Scholar
  5. Davenport, T. H., & Prusak, L. (1998). Working knowledge: How organizations manage what they know (1st ed.). Boston: Harvard Business School Press.Google Scholar
  6. Edvinsson, L., & Malone, M. (1997). Intellectual capital: Realizing your company's true value by finding its hidden brainpower. NY: Harper Business Publishers.Google Scholar
  7. Grant, R. M. (1996). Toward a knowledge-based theory of the firm. Strategic Management Journal, 17, 109–122.CrossRefGoogle Scholar
  8. Hwang, S. Y., & Yang, W. S. (2002). On the discovery of process models from their instances. Decision Support Systems, 34(1), 41–57.CrossRefGoogle Scholar
  9. Kane, A. A., Linda, A., & Levine, J. M. (2005). Knowledge transfer between groups via personnel rotation: Effects of social identity and knowledge quality. Organizational Behavior and Human Decision Processes, 96(1), 56–71.CrossRefGoogle Scholar
  10. Liao, S. (2003). Knowledge management technologies and applications—literature review from 1995 to 2002. Expert Systems with Applications, 25(2), 155–164.Google Scholar
  11. Mark, G. (1998). Annotate A Web-based Knowledge Management Support System for Document Collections, PhD Thesis, NEW YORK UNIVERSITY, USA.Google Scholar
  12. Nonaka, I. (1990). Managing innovation as a knowledge-creation process: a new model for a knowledge-creating organization. Paper presented at New York University, Stern School of Business, International Business ColloquiumGoogle Scholar
  13. Nonaka, I. (1991). The knowledge-creating company. Harvard Business Review, 69(6), 96–104.Google Scholar
  14. Nonaka, I. (1994). A dynamic theory of organizational knowledge creation. Organization Science, 5, 14–37.CrossRefGoogle Scholar
  15. Nonaka, I., & Takeuchi, H. (1995). The Knowledge-Creating Company: How Japanese Companies Create the Dynamics of Innovation, Oxford University Press.Google Scholar
  16. Nonaka, I., & Toyama, R. (2003). The knowledge creating theory revisited: knowledge creation as a synthesizing process, Knowledge Management Research & Practice, 2–10.Google Scholar
  17. Polanyi, M. (1967). The Tacit Dimension. London: Routledge.Google Scholar
  18. Rao, L., & Osei-Bryson, K. M. (2007). Towards defining dimensions of knowledge systems quality. Expert Systems with Applications, 33(2), 368–378.CrossRefGoogle Scholar
  19. Rubin,V., Gunther, C.W., van der Aalst,W.M.P., Kindler, E., van Dongen, B.F., & Schafer, W. (2007). Process mining framework for software processes. Paper presented at the Proceedings of the International Conference on Software Processes, Minneapolis, USA.Google Scholar
  20. Song, M., & van der Aalst, W. M. P. (2008). Towards comprehensive support for organizational mining. Decision Support Systems, 46, 300–317.CrossRefGoogle Scholar
  21. van der Aalst, W. M. P. (2008). Decision Support Based on Process Mining. In F. B. Clyde & W. Holsapple (Eds.), International Handbooks on Information Systems Handbook on Decision Support Systems 1 (pp. 637–657). Heidelberg: Springer -Verlag.CrossRefGoogle Scholar
  22. van der Aalst, W. M. P., van Dongen, B. F., Herbst, J., Maruster, L., Schimm, G., & Weijters, A. J. M. M. (2003). Workflow Mining: a survey of issues and approaches. Data and Knowledge Engineering, 47(2), 237–267.CrossRefGoogle Scholar
  23. van der Aalst, W. M. P., & Weijters, A. J. M. M. (2004). Process mining: a research agenda. Computers in Industry, 53, 231–244.CrossRefGoogle Scholar
  24. Wang, Y.L., Wang, J., & Zhang, S.H. (2005). Collaborative knowledge management by integrating knowledge modeling and workflow modeling. Paper presented at Proceedings of International Conference on Information Reuse and Integration, Las Vegas, Nevada.Google Scholar
  25. Yang, K. W., & Huh, S. Y. (2008). Automatic expert identification using a text categorization technique in knowledge management systems. Expert Systems with Applications, 34(2), 1445–1455.CrossRefGoogle Scholar
  26. Yang, W. S., & Hwang, S. Y. (2006). A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications, 31(1), 56–68.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.School of Economics and ManagementBeijing University of Aeronautics and AstronauticsBeijingPeople’s Republic of China
  2. 2.China State Construction Engineering Corporation 1st Bureau LtdBeijingPeople’s Republic of China
  3. 3.School of Business Administration, China University of PetroleumBeijingPeople’s Republic of China

Personalised recommendations