scholarly journals Process mining at Lufthansa CityLine: The path to process excellence

2021 ◽  
pp. 204388692110223
Author(s):  
Markus Böhm ◽  
Julian Rott ◽  
Julia Eggers ◽  
Philipp Grindemann ◽  
Janina Nakladal ◽  
...  

Process mining is a big data technology, which focuses on the discovery, monitoring, and improvement of business processes, based on real data from information systems. This teaching case describes the objectives of a German airline as it introduces process mining and discusses current and future value potentials of this technology. The case is particularly useful for executive MBA courses on Strategy (the value of IT investments) or master’s-level courses on Business Process Management. This case has three main learning objectives. First, students will evaluate the capabilities of different (technological) approaches to reaching the airline’s business goals and will make a justified decision on the feasibility of implementing process mining. Second, students will analyze the airline’s approach to implementing process mining and the challenges along the way. They will derive lessons learned and discuss approaches to solving challenges. Third, students will evaluate the value potentials of process mining. This will enable the students to make well-informed decisions on technology investments and to discover how these decisions can contribute to business goals. The case is designed to be taught in two formats. In a 90-min lecture, students need to prepare short assignments for classroom discussions. In a 180-min lecture, the assignments are included as group work during the lecture, but they require the students to read the case before class. Teaching Notes, including videos and additional study material to support group work, are available to eligible lecturers upon request.

Author(s):  
Julia Eggers ◽  
Andreas Hein ◽  
Markus Böhm ◽  
Helmut Krcmar

AbstractIn recent years, process mining has emerged as the leading big data technology for business process analysis. By extracting knowledge from event logs in information systems, process mining provides unprecedented transparency of business processes while being independent of the source system. However, despite its practical relevance, there is still a limited understanding of how organizations act upon the pervasive transparency created by process mining and how they leverage it to benefit from increased process awareness. Addressing this gap, this study conducts a multiple case study to explore how four organizations achieved increased process awareness by using process mining. Drawing on data from 24 semi-structured interviews and archival sources, this study reveals seven sociotechnical mechanisms based on process mining that enable organizations to create either standardized or shared awareness of sub-processes, end-to-end processes, and the firm’s process landscape. Thereby, this study contributes to research on business process management by revealing how process mining facilitates mechanisms that serve as a new, data-driven way of creating process awareness. In addition, the findings indicate that these mechanisms are influenced by the governance approach chosen to conduct process mining, i.e., a top-down or bottom-up driven implementation approach. Last, this study also points to the importance of balancing the social complications of increased process transparency and awareness. These results serve as a valuable starting point for practitioners to reflect on measures to increase organizational process awareness through process mining.


Author(s):  
Giuseppe De Giacomo ◽  
Paolo Felli ◽  
Marco Montali ◽  
Giuseppe Perelli

Temporal logics over finite traces, such as LTLf and its extension LDLf, have been adopted in several areas, including Business Process Management (BPM), to check properties of processes whose executions have an unbounded, but finite, length. These logics express properties of single traces in isolation, however, especially in BPM it is also of interest to express properties over the entire log, i.e., properties that relate multiple traces of the log at once. In the case of infinite-traces, HyperLTL has been proposed to express these ``hyper'' properties. In this paper, motivated by BPM, we introduce HyperLDLf, a logic that extends LDLf with the hyper features of HyperLTL. We provide a sound, complete and computationally optimal technique, based on DFAs manipulation, for the model checking problem in the relevant case where the set of traces (i.e., the log) is a regular language. We illustrate how this form of model checking can be used for verifying log of business processes and for advanced forms of process mining.


Author(s):  
Javier Fabra ◽  
Valeria de Castro ◽  
Verónica Andrea Bollati ◽  
Pedro Álvarez ◽  
Esperanza Marcos

The business goals of an enterprise process are traced to business process models with the aim of being carried out during the execution stage. The automatic translation from these models to fully executable code that can be simulated and round-trip engineered is still an open challenge in the Business Process Management field. Model-driven Engineering has proposed a set of methodologies to solve the existing gap between business analysts and software developers, but the expected results have not been reached yet. In order to rise to this challenge, in this chapter the authors propose a solution based on the integration of three previous proposals: SOD-M, DENEB, and MeTAGeM. On the one hand, SOD-M is a model-driven method for the development of service-oriented systems. Business analysts can use SOD-M to transform their business goals into composition service models, a type of model that represents business processes. On the other hand, DENEB is a platform for the development and execution of flexible business processes, represented by means of workflow models. The authors' approach focuses on the automatic transformation of SOD-M models to DENEB workflow models, resulting in a business process that is coded by a class of high-level Petri-nets, and it is directly executable in DENEB. The model transformation process has been automated using the MeTAGeM tool, which automatically generates the set of ATL rules required to transform SOD-M models to DENEB workflows. Finally, the integration of the three proposals has been illustrated by means of a real system related to the management of medical images.


Author(s):  
Wil M.P. van der Aalst ◽  
Mariska Netjes ◽  
Hajo A. Reijers

Business process management (BPM) systems provide a broad range of facilities to enact and manage operational business processes. Ideally, these systems should provide support for the complete BPM life-cycle: (re)design, configuration, execution, control, and diagnosis of processes. However, based on an extensive evaluation of the FileNet P8 BPM Suite, we show that existing BPM tools are unable to support the full life-cycle. There are clearly gaps between the various phases (e.g., users need to transfer or interpret information without any support) and some of the phases (e.g., the redesign and diagnosis phases) are not supported sufficiently. This chapter shows that techniques for process mining and intelligent redesign can be used to offer better support for the (re)design and diagnosis phases and, thus, close the BPM life-cycle. We also briefly report on the work done in the context of the ProM tool, which is used as framework to experiment with such techniques.


2021 ◽  
Vol 12 (1) ◽  
pp. 1-13
Author(s):  
C.R. Oruthotaarachchi ◽  
W M J I Wijayanayake

Business Process Management (BPM) is considered as a management approach that primarily focuses on analyzing and continuously improving business processes. It has been a key strategy adapted by organizations to manage their businesses successfully along with information technology. In the past few decades BPM has been one of the promising research areas. This paper adds knowledge to the existing research by answering following questions: (1) what is the status of BPM research domain? And (2) what are the possible future research directions on BPM? A thematic review was conducted focusing a series of literature on BPM which have been published between 2001 and 2020. The findings highlight that the integration of BPM into new digital innovations, such as process mining, is essential for an effective and efficient organization. More research on BPM and IT management needs to be conducted to support this integration between BPM and digital innovations.


2018 ◽  
Vol 6 ◽  
pp. 35-40
Author(s):  
Serhii Chalyi ◽  
Ievgen Bogatov

The problem of constructing an attribute description of a business process with the automated formation of process models “as is” using logs of information systems in which the tracks of individual processes are not identified is considered. It is shown that to solve this problem, it is advisable to distinguish the distinctive properties of individual business processes represented by the attributes of log events. A method for constructing an attribute description of a business process is proposed. The method is based on the comparison of combinations of attributes for intervals of events of a fixed length and the subsequent selection of subsets of attributes with the same values. The method includes the steps of forming the intervals of events, constructing combinations of attributes for specified intervals, as well as calculating and subsequently averaging the weights of combinations of attributes on these intervals. The result of the method is a weight-ordered set of event attributes and their values, which takes into account the attribute and temporal aspects of the business process. The method creates conditions for a more efficient transition from functional to process management based on splitting the log into processes using the resulting attribute description and subsequent prototyping of business process models “as is” by means of process mining.


Author(s):  
Małgorzata B. Pańkowska

In this chapter, the concept of autopoietic system is assumed to stem from the theory of social communication systems, which reproduce all their specific structures and self-referential processes. This chapter aims at the analysis of business process development and management. The main goal is to present an original framework of business process management. Through this framework, business processes can be interpreted as autonomic artifacts which are created, discovered, explored, and disseminated within social communities of practice. This constant reproduction of processes and their dissemination allows the social organization to exist, cope with internal complexity, and achieve its operational goals. The chapter consists of three main parts. The first part covers the systematic literature review on business process mining and referencing. The second part includes the discussion on presented business process framework. The last part comprises a case study to present and discuss the application of the framework for the development of academic virtual education processes.


Author(s):  
S. A. Roshchektaev ◽  
U. Yu. Roshchektaeva

The article discusses the methodological basis and practice of using Process mining technology to improve the efficiency of business processes of Russian companies. The challenges of the digital economy and prerequisites for the development of Process mining methods are identified. The directions of transformation of approaches to process management in the conditions of application of Process mining methods are established. The main synergy effects of internal audit and Process mining are identified. The stages of implementation of the Process mining project and quality criteria for corporate data logs are considered. An algorithm of actions is proposed to prepare for the introduction of Process mining technology in Russian companies; to obtain the identified synergy effects by internal audit.There is no conflict of interests.


2019 ◽  
Vol 5 (2) ◽  
pp. 109-115
Author(s):  
Johanes Fernandes Andry ◽  
Gunawan Wang ◽  
Gusti Ngurah Suryantara ◽  
Devi Yurisca Bernanda

PT Hema Indonesia is manufacturing company established in 2001 and has continued to grow. Nowadays the company has supported business processes in various companies, such as the use of information systems. The purpose of this research is to get an overview of the performance of information systems in order to determine the extent of maturity level which is currently running, with a few aspects to consider such as effectiveness and, efficiency. Implementing IT governance, however, is a challenge to organizations. To ensure IT alignment with business goals use standard COBIT. The analytical tool used is the standard procedure COBIT issued by ISACA. In this paper the method to be used is COBIT 4.1. Coverage of Audit IT Domain are Plan Organize (PO), such as PO4, PO5, PO7 and PO8. The conclusion that can be drawn from the research that has been done is IT governance at the company has been done, although still run optimally within each IT process contained in the sub domain average on level repeatable and defined proses.


Author(s):  
Matteo Zavatteri ◽  
Carlo Combi ◽  
Luca Viganò

AbstractA current research problem in the area of business process management deals with the specification and checking of constraints on resources (e.g., users, agents, autonomous systems, etc.) allowed to be committed for the execution of specific tasks. Indeed, in many real-world situations, role assignments are not enough to assign tasks to the suitable resources. It could be the case that further requirements need to be specified and satisfied. As an example, one would like to avoid that employees that are relatives are assigned to a set of critical tasks in the same process in order to prevent fraud. The formal specification of a business process and its related access control constraints is obtained through a decoration of a classic business process with roles, users, and constraints on their commitment. As a result, such a process specifies a set of tasks that need to be executed by authorized users with respect to some partial order in a way that all authorization constraints are satisfied. Controllability refers in this case to the capability of executing the process satisfying all these constraints, even when some process components, e.g., gateway conditions, can only be observed, but not decided, by the process engine responsible of the execution. In this paper, we propose conditional constraint networks with decisions (CCNDs) as a model to encode business processes that involve access control and conditional branches that may be both controllable and uncontrollable. We define weak, strong, and dynamic controllability of CCNDs as two-player games, classify their computational complexity, and discuss strategy synthesis algorithms. We provide an encoding from the business processes we consider here into CCNDs to exploit off-the-shelf their strategy synthesis algorithms. We introduce $$\textsc {Zeta}$$ Z E T A , a tool for checking controllability of CCNDs, synthesizing execution strategies, and executing controllable CCNDs, by also supporting user interactivity. We use $$\textsc {Zeta}$$ Z E T A to compare with the previous research, provide a new experimental evaluation for CCNDs, and discuss limitations.


Sign in / Sign up

Export Citation Format

Share Document