process mining - chapter 1 - introduction

29
Chapter 1 Introduction prof.dr.ir. Wil van der Aalst www.processmining.org

Upload: wil-van-der-aalst

Post on 07-Nov-2014

1.677 views

Category:

Business


6 download

DESCRIPTION

Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.

TRANSCRIPT

Page 1: Process Mining - Chapter 1 - Introduction

Chapter 1Introduction

prof.dr.ir. Wil van der Aalstwww.processmining.org

Page 2: Process Mining - Chapter 1 - Introduction

Overview

PAGE 1

Part I: Preliminaries

Chapter 2 Process Modeling and Analysis

Chapter 3Data Mining

Part II: From Event Logs to Process Models

Chapter 4 Getting the Data

Chapter 5 Process Discovery: An Introduction

Chapter 6 Advanced Process Discovery Techniques

Part III: Beyond Process Discovery

Chapter 7 Conformance Checking

Chapter 8 Mining Additional Perspectives

Chapter 9 Operational Support

Part IV: Putting Process Mining to Work

Chapter 10 Tool Support

Chapter 11 Analyzing “Lasagna Processes”

Chapter 12 Analyzing “Spaghetti Processes”

Part V: Reflection

Chapter 13Cartography and Navigation

Chapter 14Epilogue

Chapter 1 Introduction

Page 3: Process Mining - Chapter 1 - Introduction

Data explosion

PAGE 2

Page 4: Process Mining - Chapter 1 - Introduction

PAGE 3

The World's Technological Capacity to Store, Communicate, and Compute Information by Martin Hilbert and Priscila López (DOI 10.1126/science.1200970)

Page 5: Process Mining - Chapter 1 - Introduction

PAGE 4

Page 6: Process Mining - Chapter 1 - Introduction

Example process model

PAGE 5

start register request

examine thoroughly

examine casually

check ticket

decide

pay compensation

reject request

reinitiate request

end

c1

c2

c3

c4

c5

Page 7: Process Mining - Chapter 1 - Introduction

Same process in terms of BPMN rather than Petri nets

PAGE 6

register request

examine casually

examine thoroughly

check ticket

decide

pay compensation

reject request

reinitiate request

start end

Page 8: Process Mining - Chapter 1 - Introduction

What are process models used for?

• insight: while making a model, the modeler is triggered to view the process from various angles;

• discussion: the stakeholders use models to structure discussions;• documentation: processes are documented for instructing people or

certification purposes (cf. ISO 9000 quality management);• verification: process models are analyzed to find errors in systems or

procedures (e.g., potential deadlocks);• performance analysis: techniques like simulation can be used to

understand the factors influencing response times, service levels, etc.;• animation: models enable end users to “play out” different scenarios

and thus provide feedback to the designer;• specification: models can be used to describe a PAIS before it is

implemented and can hence serve as a “contract” between the developer and the end user/management; and

• configuration: models can be used to configure a system.PAGE 7

Page 9: Process Mining - Chapter 1 - Introduction

Limitations

• Executable models may be used to force people to work in a particular manner.

• However, most models are not well-aligned with reality.

• Most hand-made models are disconnected from reality and provide only an idealized view on the processes at hand: “paper tigers”.

• Given (a) the interest in process models, (b) the abundance of event data, and (c) the limited quality of hand-made models, it seems worthwhile to relate event data to process models: process mining!

PAGE 8

Page 10: Process Mining - Chapter 1 - Introduction

BPM life-cycle showing the classical uses of process models

PAGE 9

diagnosis/requirements

configuration/implementation

enactment/monitoring

adjustment

(re)designmodelsdata

insightdiscussion

verification

performance analysisanimation

specificationdocumentation

configuration

Page 11: Process Mining - Chapter 1 - Introduction

The three main types of process mining: discovery, conformance, and enhancement

PAGE 10

software system

(process)model

eventlogs

modelsanalyzes

discovery

records events, e.g., messages,

transactions, etc.

specifies configures implements

analyzes

supports/controls

enhancement

conformance

“world”

people machines

organizationscomponents

businessprocesses

Page 12: Process Mining - Chapter 1 - Introduction

Orthogonal: Perspectives

• The control-flow perspective focuses on the control-flow, i.e., the ordering of activities.

• The organizational perspective focuses on information about resources hidden in the log, i.e., which actors (e.g., people, systems, roles, and departments) are involved and how are they related.

• The case perspective focuses on properties of cases, e.g., cases can also be characterized by the values of the corresponding data elements.

• The time perspective is concerned with the timing and frequency of events.

PAGE 11

Page 13: Process Mining - Chapter 1 - Introduction

Starting point: event log

PAGE 12

XES, MXML, SA-MXML, CSV, etc.

Page 14: Process Mining - Chapter 1 - Introduction

Simplified event log

PAGE 13

a = register request, b = examine thoroughly, c = examine casually, d = check ticket,e = decide, f = reinitiate request, g = pay compensation, and h = reject request

Page 15: Process Mining - Chapter 1 - Introduction

Processdiscovery

PAGE 14

astart register

request

bexamine

thoroughly

cexamine casually

d

check ticket

decide

pay compensation

reject request

reinitiate request

e

g

h

f

end

c1

c2

c3

c4

c5

Page 16: Process Mining - Chapter 1 - Introduction

Another example

PAGE 15

astart register

request

bexamine

thoroughly

d

check ticket

decide reject request

e hend

c1

c2

c3

c4

c5

Page 17: Process Mining - Chapter 1 - Introduction

Beyond discovery: conformance and enhancement

PAGE 16

software system

(process)model

eventlogs

modelsanalyzes

discovery

records events, e.g., messages,

transactions, etc.

specifies configures implements

analyzes

supports/controls

enhancement

conformance

“world”

people machines

organizationscomponents

businessprocesses

Page 18: Process Mining - Chapter 1 - Introduction

Another event log

PAGE 17

astart register

request

bexamine

thoroughly

cexamine casually

d

check ticket

decide

pay compensation

reject request

reinitiate request

e

g

h

f

end

c1

c2

c3

c4

c5

Page 19: Process Mining - Chapter 1 - Introduction

Extension

PAGE 18

astart register

request

bexamine

thoroughly

cexamine casually

d

check ticket

decide

pay compensation

reject request

reinitiate request

e

g

h

f

end

c1

c2

c3

c4

c5

Performance information (e.g., the average time between two subsequent activities) can be extracted from the event log and visualized on top of the model.

A

A

A

A

A

E

M

M

Pete

Mike

Ellen

Role A:Assistant

Sue

Sean

Role E:Expert

Sara

Role M:Manager Decision rules (e.g., a decision tree

based on data known at the time a particular choice was made) can be learned from the event log and used to annotated decisions.

The event log can be used to discover roles in the organization (e.g., groups of people with similar work patterns). These roles can be used to relate individuals and activities.

Page 20: Process Mining - Chapter 1 - Introduction

Play-Out

PAGE 19

event logprocess model

Page 21: Process Mining - Chapter 1 - Introduction

Play-In

PAGE 20

event log process model

Page 22: Process Mining - Chapter 1 - Introduction

Replay

PAGE 21

event log process model

• extended model showing times, frequencies, etc.

• diagnostics• predictions• recommendations

Page 23: Process Mining - Chapter 1 - Introduction

Replay

• Connecting models to real events is crucial!• Possible uses:

− Conformance checking− Repairing models− Extending the model with frequencies and temporal

information− Constructing predictive models− Operational support (prediction, recommendation,

etc.)

PAGE 22

Page 24: Process Mining - Chapter 1 - Introduction

Desire lines in process models

PAGE 23

Page 25: Process Mining - Chapter 1 - Introduction

Trends and terms

• Business Process Management (BPM) • Business Intelligence (BI)• Online Analytical Processing (OLAP)• Business Activity Monitoring (BAM)• Complex Event Processing (CEP)• Corporate Performance Management (CPM)• Visual Analytics (VA)• Predictive Analytics (PA)• Continuous Process Improvement (CPI)• Total Quality Management (TQM)• Six Sigma

PAGE 24

Page 26: Process Mining - Chapter 1 - Introduction

Six Sigma

• Six Sigma was originally developed by Motorola in the early 1980s.

• DMAIC approach: − Define the problem and set targets,− Measure key performance indicators and collect data,− Analyze the data to investigate and verify cause-and-

effect relationships,− Improve the current process based on this analysis, − Control the process to minimize deviations from the

target.

PAGE 25

Page 27: Process Mining - Chapter 1 - Introduction

[μ-6σ, μ+6σ] with a 1.5σ shift

PAGE 26

A process that “runs at Six Sigma” has only

3.4 defective cases per million cases, i.e., on average 99.9997% of the cases is handled

properly.

Page 28: Process Mining - Chapter 1 - Introduction

Performance improvement versus compliance

• Organizations are also putting more emphasis on corporate governance, risk, and compliance.

• Scandals (Enron, Tyco, Adelphia, Peregrine, WorldCom, etc.) have fueled interest in more rigorous auditing practices.

• New legislation such as the Sarbanes-Oxley Act (SOX) of 2002 and the Basel II Accord of 2004 emerged as a result.

• Importance of verifying whether organizations operate “within their boundaries” is increasing.

PAGE 27

Page 29: Process Mining - Chapter 1 - Introduction

Outlook

PAGE 28

Part I: Preliminaries

Chapter 2 Process Modeling and Analysis

Chapter 3Data Mining

Part II: From Event Logs to Process Models

Chapter 4 Getting the Data

Chapter 5 Process Discovery: An Introduction

Chapter 6 Advanced Process Discovery Techniques

Part III: Beyond Process Discovery

Chapter 7 Conformance Checking

Chapter 8 Mining Additional Perspectives

Chapter 9 Operational Support

Part IV: Putting Process Mining to Work

Chapter 10 Tool Support

Chapter 11 Analyzing “Lasagna Processes”

Chapter 12 Analyzing “Spaghetti Processes”

Part V: Reflection

Chapter 13Cartography and Navigation

Chapter 14Epilogue

Chapter 1 Introduction