Page 28 -
P. 28

10                                                     1  Introduction

              The first type of process mining is discovery. A discovery technique takes an
            event log and produces a model without using any a-priori information. An example
            is the α-algorithm [103] that will be described in Chap. 5. This algorithm takes
            an event log and produces a Petri net explaining the behavior recorded in the log.
            For example, given sufficient example executions of the process shown in Fig. 1.1,
            the α-algorithm is able to automatically construct the Petri net without using any
            additional knowledge. If the event log contains information about resources, one can
            also discover resource-related models, e.g., a social network showing how people
            work together in an organization.
              The second type of process mining is conformance. Here, an existing process
            model is compared with an event log of the same process. Conformance check-
            ing can be used to check if reality, as recorded in the log, conforms to the model
            and vice versa. For instance, there may be a process model indicating that purchase
            orders of more than one million Euro require two checks. Analysis of the event
            log will show whether this rule is followed or not. Another example is the check-
            ing of the so-called “four-eyes” principle stating that particular activities should
            not be executed by one and the same person. By scanning the event log using a
            model specifying these requirements, one can discover potential cases of fraud.
            Hence, conformance checking may be used to detect, locate and explain devia-
            tions, and to measure the severity of these deviations. An example is the confor-
            mance checking algorithm described in [80]. Given the model shown in Fig. 1.1
            and a corresponding event log, this algorithm can quantify and diagnose devia-
            tions.
              The third type of process mining is enhancement. Here, the idea is to extend
            or improve an existing process model using information about the actual process
            recorded in some event log. Whereas conformance checking measures the alignment
            between model and reality, this third type of process mining aims at changing or
            extending the a-priori model. One type of enhancement is repair, i.e., modifying the
            model to better reflect reality. For example, if two activities are modeled sequentially
            but in reality can happen in any order, then the model may be corrected to reflect
            this. Another type of enhancement is extension, i.e., adding a new perspective to
            the process model by cross-correlating it with the log. An example is the extension
            of a process model with performance data. For instance, by using timestamps in
            the event log of the “request for compensation” process, one can extend Fig. 1.1
            to show bottlenecks, service levels, throughput times, and frequencies. Similarly,
            Fig. 1.1 can be extended with information about resources, decision rules, quality
            metrics, etc.
              As indicated earlier, process models such as depicted in Figs. 1.1 and 1.2 show
            only the control-flow. However, when extending process models, additional perspec-
            tives are added. Moreover, discovery and conformance techniques are not limited to
            control-flow. For example, one can discover a social network and check the validity
            of some organizational model using an event log. Hence, orthogonal to the three
            types of mining (discovery, conformance, and enhancement), different perspectives
            can be identified.
   23   24   25   26   27   28   29   30   31   32   33