Abstract
Process mining techniques are commonly used in business management while conformance checking becomes an important issue in business process management. Researchers derive the actual business process from event logs to draw a comparison with the business process model. When the two are inconsistent, a lack of internal controls happens.
This research proposes the consistence checking in the event logs. Because of the different granularity in the same event logs, the process can be demonstrated as grain 1 to grain n, in which the smaller the grain means the finer the granularity of the process. While using a process log to retrace the business process, different business processes might be shown in the processes with different granularities in the same event logs. The dependency threshold of Heuristic miner algorithm is used to deal with the differences of consistency automatically in this research.
This research uses the event logs from a marble processing industry for the case conformance. Focusing on the fine and coarse two granularities of the business process matrix, the conformance checking is applied for a consistent business process via the setting of the dependency threshold and the consistent ratio. The result show the valuable information to audit or re-design the business process model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Accorsi, R., Stocker, T.: On the exploitation of process mining for security audits: the conformance checking case. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1709–1716. ACM (March 2012)
Adriansyah, A., van Dongen, B.F., van der Aalst, W.M.P.: Towards robust conformance checking. In: Muehlen, M.Z., Su, J. (eds.) BPM 2010 Workshops. LNBIP, vol. 66, pp. 122–133. Springer, Heidelberg (2011)
Cook, J.E., Wolf, A.L.: Discovering models of software processes from event-based data. ACM Transactions on Software Engineering and Methodology (TOSEM) 7(3), 215–249 (1998)
Cook, J.E., Wolf, A.L.: Event-based detection of concurrency. ACM 23(6), 35–45 (1998)
Fahland, D., de Leoni, M., van Dongen, B.F., van der Aalst, W.M.P.: Conformance checking of interacting processes with overlapping instances. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 345–361. Springer, Heidelberg (2011)
Jans, M., Lybaert, N., Vanhoof, K.: A framework for internal fraud risk reduction at it integrating business processes: the IFR² framework. The International Journal of Digital Accounting Research 9(15), 7 (2010)
Mans, R.S., Schonenberg, M.H., Song, M., Van der Aalst, W.M.P., Bakker, P.J.M.: Application of process mining in healthcare–a case study in a dutch hospital. In: Fred, A., Filipe, J., Gamboa, H. (eds.) BIOSTEC 2008. CCIS, vol. 25, pp. 425–438. Springer, Heidelberg (2009)
Murata, T.: Petri nets: Properties, analysis and applications. Proceedings of the IEEE 77(4), 541–580 (1989)
Rozinat, A., van der Aalst, W.M.P.: Conformance testing: Measuring the fit and appropriateness of event logs and process models. In: Bussler, C.J., Haller, A. (eds.) BPM 2005. LNCS, vol. 3812, pp. 163–176. Springer, Heidelberg (2006)
Rozinat, A., van der Aalst, W.M.: Conformance checking of processes based on monitoring real behavior. Information Systems 33(1), 64–95 (2008)
Song, M., van der Aalst, W.M.: Towards comprehensive support for organizational mining. Decision Support Systems 46(1), 300–317 (2008)
Van der Aalst, W.M.P.: Petri-net-based workflow management software. In: Proceedings of the NFS Workshop on Workflow and Process Automation in Information Systems, pp. 114–118. IEEE Computer Society (May 1996)
van der Aalst, W.M.P., van Dongen, B.F.: Discovering workflow performance models from timed logs. In: Han, Y., Tai, S., Wikarski, D. (eds.) EDCIS 2002. LNCS, vol. 2480, pp. 45–63. Springer, Heidelberg (2002)
Van Aalst, W.M., van Hee, K.M., van Werf, J.M., Verdonk, M.: Auditing 2.0: Using process mining to support tomorrow’s auditor. Computer 43(3), 90–93 (2010)
Van der Aalst, W.M., Weijters, A.J.M.M.: Process mining: a research agenda. Computers in Industry 53(3), 231–244 (2004)
Van der Aalst, W., Weijters, T., Maruster, L.: Workflow mining: Discovering process models from event logs. IEEE Transactions on Knowledge and Data Engineering 16(9), 1128–1142 (2004)
Weijters, A.J.M.M., Van der Aalst, W.M.P.: Rediscovering workflow models from event-based data. In: Proceedings of the 11th Dutch-Belgian Conference on Machine Learning (Benelearn 2001), pp. 93–100 (2001)
Weijters, A.J.M.M., van der Aalst, W.M., De Medeiros, A.A.: Process mining with the heuristics miner-algorithm. Technische Universiteit Eindhoven, Tech. Rep. WP, 166 (2006)
Günther, C.W., van der Aalst, W.M.P.: Fuzzy Mining - Adaptive Process Simplification Based on Multi-perspective Metrics. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 328–343. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chuang, YC., Hsu, P., Chen, HH. (2013). Unifying Multi-level Business Process Discovered by Heuristic Miner Algorithm. In: Ramanna, S., Lingras, P., Sombattheera, C., Krishna, A. (eds) Multi-disciplinary Trends in Artificial Intelligence. MIWAI 2013. Lecture Notes in Computer Science(), vol 8271. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-44949-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-44949-9_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-44948-2
Online ISBN: 978-3-642-44949-9
eBook Packages: Computer ScienceComputer Science (R0)