Professional Documents
Culture Documents
Computers in Industry
journal homepage: www.elsevier.com/locate/compind
Process Mining for the multi-faceted analysis of business processesA case study
in a nancial services organization
Jochen De Weerdt a,*, Annelies Schupp a, An Vanderloock a, Bart Baesens a,b
a
b
Department of Decision Sciences and Information Management, Katholieke Universiteit Leuven, Naamsestraat 69, B-3000 Leuven, Belgium
School of Management, University of Southampton, High_eld Southampton SO17 1BJ, United Kingdom
A R T I C L E I N F O
A B S T R A C T
Article history:
Received 7 September 2011
Received in revised form 9 August 2012
Accepted 18 September 2012
Available online 12 October 2012
Most organizations have some kind of process-oriented information system that keeps track of business
events. Process Mining starts from event logs extracted from these systems in order to discover, analyze,
diagnose and improve processes, organizational, social and data structures. Notwithstanding the large
number of contributions to the process mining literature over the last decade, the number of studies
actually demonstrating the applicability and value of these techniques in practice has been limited. As a
consequence, there is a need for real-life case studies suggesting methodologies to conduct process
mining analysis and to show the benets of its application in real-life environments. In this paper we
present a methodological framework for a multi-faceted analysis of real-life event logs based on Process
Mining. As such, we demonstrate the usefulness and exibility of process mining techniques to expose
organizational inefciencies in a real-life case study that is centered on the back ofce process of a large
Belgian insurance company. Our analysis shows that process mining techniques constitute an ideal
means to tackle organizational challenges by suggesting process improvements and creating a companywide process awareness.
2012 Elsevier B.V. All rights reserved.
Keywords:
Process Mining
Event log analysis
Real-life application
Financial services industry
1. Introduction
These days it is impossible for an organization to operate without
some sort of enterprise information system. During the last decades,
information systems (IS) have transformed from simple systems
with limited functionality to complex, integrated architectures. As a
result, it becomes harder to understand and monitor how these
systems impact the execution of every-day processes in organizations. Process Mining [17] offers a solution based on the extraction,
analysis, diagnosis and visualization of the data recorded by an IS
during process execution. Although in the past, major contributions
to the process mining literature were predominantly technical in
nature, techniques have proved their usefulness in practice as well.
Nevertheless, application-oriented studies have only received
modest attention and therefore, this study demonstrates the
benets and challenges of applying process mining techniques in
practice by a multi-faceted analysis of business processes within the
back ofce of a Belgian insurance company.
58
In [4], Dumas et al. bring out one of the most inuential trends
of the past decades: the shift from a data-orientation to a processorientation. In the seventies and eighties, most information
systems were built on top of the operating system with the single
goal of storing, retrieving and presenting information. Data was at
the center of design, such that process modeling was limited to the
boundaries of the information system. This could result in
inefciencies, low responsiveness and a poor understanding of
how the routines were actually executed. It was only in the early
nineties, with the emergence of management techniques such as
process reengineering, that the modeling of processes received
more attention. The changing context stimulated the progression
of process-aware information systems (PAISs) which can be found
along the whole value chain: ERP (Enterprise Resource Planning),
WfM (Workow Management), CRM (Customer Resource Management), case handling, B2B (business To business) and SCM
(Supply Chain Management) systems. Most of these systems keep
track of the actual execution of the business processes by logging
large amounts of data that form the input for process analysis
techniques.
Business Process
Management
Business
Intelligence
BPA
Process
Mining
WfM
BPI
BAM
59
Table 1
An overview of practical applications of process mining in the literature.
Author
Domain
Year
Public services
Public services
Healthcare
Public services
Public services
Financial services
Wafer scanner industry
Public services
Telecom industry
Public services
Healthcare
2007
2007
2008
2008
2009
2009
2009
2009
2011
2011
2011
14.279
4 event logs:
35
100
358
407
627
570
83.611
10.000
24
2 event logs:
363
570
17.812
2 event logs:
796
1.882
627
# Activity types
# Events
# Originators
17
147.579
487
14
17
11
19
376
9
60
7
720
3.023
276.333
62.531
154.966
109
60
290
5
10
42
1.817
6.616
80.401
13
110
376
5.187
11.985
http://www.promtools.org/prom5/.
Case data
60
Business activities
Fig. 3. Delineation of a business process in terms of process scope (activities, case
data) and time frame.
61
62
Table 2
Characteristics of the event logs applying trace-based frequency ltering for the different perspectivesthe number of process instances (# PI), the number of distinct process
instances (# DPI), the number of activity types (# AT).
Frequency threshold
0
50
0
50
0
50
44.880
34.769
44.880
40.406
44.880
39.396
# PI
Control-ow log
Team ow log
Document ow log
(100%)
(77.47%)
(100%)
(90.47%)
(100%)
(87.78%)
Heuristic net
characteristics
# DPI
#AT
# Arcs
# Activities
4.494
667
1.222
77
2.027
41
15 activities
13 activities
59 teams
30 teams
189 documents
22 documents
209
69
498
165
209
69
16
14
61
32
191
24
63
Fig. 5. Visualization of the dependency graph for the control-ow log with a frequency threshold of 50.
Fig. 6. Visualization of the dependency graph for the team ow log with a frequency threshold of 50. The enlargement shows one of the many reiterated handovers between
teams.
64
Fig. 7. Visualization (dependency graph) for the document type event log with a frequency threshold of 50.
that were sent back and forth between teams. Since this issue was
conrmed by our analysis (see Fig. 6), this behavior is further
investigated in Section 5.4.2.2.
5.3.3. Case data event log: document types
Finally, an exploratory analysis of the document types was
carried out. As such, we investigated the sequences of the
document type changes. Due to the infeasibility of displaying
the model for the complete event log, a lter was applied similar to
former perspectives to visualize only frequent document paths.
The results of the ltering were striking since the number of
document types decreased from 189 to only 22 and the total of
different possible paths declined from 2.027 to 41. Because almost
90 percent of the logged data is retained and form the input for the
resulting process model in Fig. 7, the applied ltering can be
considered very effective with respect to limiting the behavior and
as such being able to derive insights from the data. Even though the
system exhibits a large amount of freedom, a large amount of
behavior is captured by a small amount of possible document type
sequences. This emphasizes the relevance of analyzing the most
frequent document paths.
An analysis of the discovered model highlighted the issue of
wrong document classication. For instance, certain documents
change from a private proposal to a business proposal or vice versa.
In consultation with business experts, this problem was considered for further analysis.
Fig. 8. Visualization (dependency graph) of the six most frequent document type
sequences.
65
Fig. 9. Different control-ow models for the simple event log. (a) Benchmark event
log, (b) document classication problem, (c) reiterated handover problem.
dened rules and regulations, but also by contrasting managements expectations with the actual process behavior. Both types of
compliance analysis feature in this section. Firstly, a formal
analysis was executed based on a business rule concerning
document classication. Next a more informal analysis looked at
whether management expectations in terms of reiterated team
handover were conrmed.
66
67
Management at the KU Leuven. His research interests include data mining, process
mining, and web intelligence..
Bart Baesens holds a Masters degree in Business Engineering (option: Management Informatics) and a PhD in Applied Economic Sciences from KU Leuven,
Belgium. He is currently an associate professor at KU Leuven, and a guest lecturer at
the University of Southampton (United Kingdom). He has done extensive research
on data mining and its applications, for instance in the elds of CRM, credit risk
management, fraud detection, software engineering, business process intelligence,
web analytics and mining, and social networks.