Skip to main content

A Conceptual Framework for Supporting Deep Exploration of Business Process Behavior

  • Conference paper
  • First Online:
Conceptual Modeling (ER 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11157))

Included in the following conference series:

Abstract

Process mining serves for gaining insights into business process behavior based on event logs. These techniques are typically limited to addressing data included in the log. Recent studies suggest extracting data-rich event logs from databases or transaction logs. However, these event logs are at a very fine granularity level, substituting business-level activities by low-level database operations, and challenging data-aware process mining. To address this gap, we propose an approach that enables a broad and deep exploration of process behavior, using a conceptual framework based on three sources: the event log that holds information regarding the business-level activities, the (relational) database that stores the current values of data elements, and the transaction (redo) log that captures historical data operations performed on the database as a result of business process activities. Nine types of operations define how to map subsets of elements among the three sources in order to support human analysts in exploring and understanding the reasons of observed process behavior. A preliminary evaluation analyzes the outcomes for four useful scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://docs.microsoft.com/en-us/sql/relational-databases/track-changes/about-change-data-capture-sql-server?view=sql-server-2017.

  2. 2.

    This definition abstracts from low level implementation aspects such as keys and foreign keys.

  3. 3.

    https://cloud.google.com/bigquery.

References

  1. Bezerra, F., Wainer, J., van der Aalst, W.M.P.: Anomaly detection using process mining. In: Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Ukor, R. (eds.) BPMDS/EMMSAD -2009. LNBIP, vol. 29, pp. 149–161. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01862-6_13

    Chapter  Google Scholar 

  2. Calvanese, D., Kalayci, T.E., Montali, M., Tinella, S.: Ontology-based data access for extracting event logs from legacy data: the onprom tool and methodology. In: Abramowicz, W. (ed.) BIS 2017. LNBIP, vol. 288, pp. 220–236. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59336-4_16

    Chapter  Google Scholar 

  3. de Leoni, M., van der Aalst, W.M.P.: Aligning event logs and process models for multi-perspective conformance checking: an approach based on integer linear programming. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094, pp. 113–129. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40176-3_10

    Chapter  Google Scholar 

  4. De Leoni, M., van der Aalst, W.M.:. Data-aware process mining: discovering decisions in processes using alignments. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 1454–1461. ACM, March 2013

    Google Scholar 

  5. de Murillas, E.G.L., Reijers, H.A., Van Der Aalst, W.M.: Connecting databases with process mining: a meta model and toolset. Softw. Syst. Modeling (2018). https://doi.org/10.1007/s10270-018-0664-7

  6. Dyer, J.N., Rogers, C.: Adapting the access northwind database to support a database course. J. Inf. Syst. Educ. 26(2), 85 (2015)

    Google Scholar 

  7. Hand, D.J.: Principles of data mining. Drug Saf. 30(7), 621–622 (2007)

    Article  Google Scholar 

  8. Jans, M., Soffer, P.: From relational database to event log: decisions with quality impact. In: Teniente, E., Weidlich, M. (eds.) BPM 2017. LNBIP, vol. 308, pp. 588–599. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-74030-0_46

    Chapter  Google Scholar 

  9. Ramezani, E., Fahland, D., van der Aalst, W.M.P.: Where did i misbehave? Diagnostic information in compliance checking. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol. 7481, pp. 262–278. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32885-5_21

    Chapter  Google Scholar 

  10. Rozinat, A., van der Aalst, W.M.P.: Decision mining in ProM. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol. 4102, pp. 420–425. Springer, Heidelberg (2006). https://doi.org/10.1007/11841760_33

    Chapter  Google Scholar 

  11. Taghiabadi, E.R., Gromov, V., Fahland, D., van der Aalst, W.M.P.: Compliance checking of data-aware and resource-aware compliance requirements. In: Meersman, R., Panetto, H., Dillon, T., Missikoff, M., Liu, L., Pastor, O., Cuzzocrea, A., Sellis, T. (eds.) OTM 2014. LNCS, vol. 8841, pp. 237–257. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45563-0_14

    Chapter  Google Scholar 

  12. Tsoury, A., Soffer, P., Reinhartz-Berger, I.: Towards impact analysis of data in business processes. In: Schmidt, R., Guédria, W., Bider, I., Guerreiro, S. (eds.) BPMDS/EMMSAD -2016. LNBIP, vol. 248, pp. 125–140. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39429-9_9

    Chapter  Google Scholar 

  13. Van der Aalst, W.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer-Verlag, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19345-3

    Book  MATH  Google Scholar 

  14. Aalst, W.M.P.: Extracting event data from databases to unleash process mining. In: vom Brocke, J., Schmiedel, T. (eds.) BPM - Driving Innovation in a Digital World. MP, pp. 105–128. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-14430-6_8

    Chapter  Google Scholar 

  15. Van der Aalst, W., Adriansyah, A., van Dongen, B.: Replaying history on process models for conformance checking and performance analysis. Wiley Interdiscip. Rev.: Data Min. Knowl. Discov. 2(2), 182–192 (2012)

    Google Scholar 

  16. Winslett, M., Smith, K., Qian, X.: Formal query languages for secure relational databases. ACM Trans. Database Syst. (TODS) 19(4), 626–662 (1994)

    Article  Google Scholar 

Download references

Acknowledgment

This research is supported by the Israel Science Foundation under grant 856/13.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Arava Tsoury , Pnina Soffer or Iris Reinhartz-Berger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tsoury, A., Soffer, P., Reinhartz-Berger, I. (2018). A Conceptual Framework for Supporting Deep Exploration of Business Process Behavior. In: Trujillo, J., et al. Conceptual Modeling. ER 2018. Lecture Notes in Computer Science(), vol 11157. Springer, Cham. https://doi.org/10.1007/978-3-030-00847-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00847-5_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00846-8

  • Online ISBN: 978-3-030-00847-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics