A process mining-based analysis of business process work-arounds

被引:17
|
作者
Outmazgin, Nesi [1 ]
Soffer, Pnina [1 ]
机构
[1] Univ Haifa, IL-31905 Haifa, Israel
来源
SOFTWARE AND SYSTEMS MODELING | 2016年 / 15卷 / 02期
关键词
Business process work-arounds; Process mining; Compliance checking; CONFORMANCE CHECKING;
D O I
10.1007/s10270-014-0420-6
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Business process work-arounds are specific forms of incompliant behavior, where employees intentionally decide to deviate from the required procedures although they are aware of them. Detecting and understanding the work-arounds performed can guide organizations in redesigning and improving their processes and support systems. Existing process mining techniques for compliance checking and diagnosis of incompliant behavior rely on the available information in event logs and emphasize technological capabilities for analyzing this information. They do not distinguish intentional incompliance and do not address the sources of this behavior. In contrast, the paper builds on a list of generic types of work-arounds found in practice and explores whether and how they can be detected by process mining techniques. Results obtained for four work-around types in five real-life processes are reported. The remaining two types are not reflected in events logs and cannot be currently detected by process mining. The detected work-around data are further analyzed for identifying correlations between the frequency of specific work-around types and properties of the processes and of specific activities. The analysis results promote the understanding of work-around situations and sources.
引用
收藏
页码:309 / 323
页数:15
相关论文
共 50 条
  • [21] Business process analysis using process mining in accommodation industry
    Kwon, Hyukjin
    Kim, Dongsoo
    ICIC Express Letters, Part B: Applications, 2015, 6 (02): : 577 - 583
  • [22] Trends in business process analysis - From verification to process mining
    van der Aalst, Wil M. P.
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: HUMAN-COMPUTER INTERACTION, 2007, : IS13 - IS22
  • [23] Trends in business process analysis - From verification to process mining
    van der Aalst, Wil M. P.
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2007, : IS13 - IS22
  • [24] Social mining-based clustering process for big-data integration
    Jung, Hoill
    Chung, Kyungyong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 589 - 600
  • [25] Work-arounds at faith-based obstetrics and gynecology residency programs to accomplish family planning training
    Go, Virginia-Arlene A.
    Steinauer, Jody
    Guiahi, Maryam
    CONTRACEPTION, 2022, 115 : 59 - 61
  • [26] LPMSAEF: Lightweight process mining-based software architecture evaluation framework for security and performance analysis
    Sahlabadi, Mahdi
    Muniyandi, Ravie Chandren
    Shukur, Zarina
    Islam, Md Rezanur
    Saberikamarposhti, Morteza
    Yim, Kangbin
    HELIYON, 2024, 10 (05)
  • [27] Social mining-based clustering process for big-data integration
    Hoill Jung
    Kyungyong Chung
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 589 - 600
  • [28] Business Process Mining Based on Simulated Annealing
    Song, Wei
    Liu, ShaoZhuo
    Liu, Qiang
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 725 - 730
  • [29] Model-based business process mining
    Ingvaldsen, JE
    Gulla, JA
    INFORMATION SYSTEMS MANAGEMENT, 2006, 23 (01) : 19 - 31
  • [30] Scalable Attack Analysis of Business Process based on Decision Mining Classification
    Rahmawati, Dewi
    Sarno, Riyanarto
    2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), 2017, : 337 - 342