End-to-End Process Extraction in Process Unaware Systems

Sukriti Goel, Jyoti M. Bhat, Barbara Weber

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

Abstract

Knowledge of current business processes is a critical requirement for organizational initiatives like compliance management, regulatory reporting, process optimization, reengineering the IT systems and outsourcing. Existing process discovery techniques expect process execution information or event logs while organization's business processes are often executed on heterogeneous systems across different departments, by integration and data hand-offs between systems. Traditional information systems, however, are designed for storing and processing transaction data which persists in databases and other data storage mechanisms. In this paper we identify the challenges and propose a solution for extracting end-to-end processes from persistent process execution data available in multiple heterogeneous applications. The approach consists of analyzing persistent system data to identify and obtain events in a non-intrusive manner. The approach to get the end-to-end process involves a combination of data and process mining.
Original languageEnglish
Title of host publicationLecture Notes in Business Information Processing
Number of pages12
Volume132
PublisherSpringer Berlin Heidelberg
Publication date2013
Pages162-173
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event10th International Conference on Business Process Management (BPM 2012) - Sokos Hotel Viru, Tallinn, Estonia
Duration: 3 Sept 20126 Sept 2012
http://bpm2012.ut.ee/

Conference

Conference10th International Conference on Business Process Management (BPM 2012)
LocationSokos Hotel Viru
Country/TerritoryEstonia
CityTallinn
Period03/09/201206/09/2012
Internet address
SeriesLecture Notes in Business Information Processing
ISSN1865-1348

Fingerprint

Dive into the research topics of 'End-to-End Process Extraction in Process Unaware Systems'. Together they form a unique fingerprint.

Cite this