6 research outputs found

    Applications and Challenges of Task Mining: A Literature Review

    Get PDF
    Task mining is a technological innovation that combines current developments in process mining and data mining. Using task mining, the interactions of workers with their workstations can be recorded, processed, and linked with the business data of the organization. The approach can provide a holistic picture of the business processes and related tasks. Currently, there is no overview of application scenarios and the challenges of task mining. In our work, we reflect application scenarios as well as technological, legal, and organizational challenges of task mining using a structured literature review. The application areas include discovery of automation potentials, monitoring, as well as optimization of business processes. The challenges include the cleansing, collection, data protection, explainability, merging, organization, processing, and segmentation of task mining data

    Measuring the impact of COVID-19 on hospital care pathways

    Get PDF
    Care pathways in hospitals around the world reported significant disruption during the recent COVID-19 pandemic but measuring the actual impact is more problematic. Process mining can be useful for hospital management to measure the conformance of real-life care to what might be considered normal operations. In this study, we aim to demonstrate that process mining can be used to investigate process changes associated with complex disruptive events. We studied perturbations to accident and emergency (A &E) and maternity pathways in a UK public hospital during the COVID-19 pandemic. Co-incidentally the hospital had implemented a Command Centre approach for patient-flow management affording an opportunity to study both the planned improvement and the disruption due to the pandemic. Our study proposes and demonstrates a method for measuring and investigating the impact of such planned and unplanned disruptions affecting hospital care pathways. We found that during the pandemic, both A &E and maternity pathways had measurable reductions in the mean length of stay and a measurable drop in the percentage of pathways conforming to normative models. There were no distinctive patterns of monthly mean values of length of stay nor conformance throughout the phases of the installation of the hospital’s new Command Centre approach. Due to a deficit in the available A &E data, the findings for A &E pathways could not be interpreted

    Research Paper: Process Mining and Synthetic Health Data: Reflections and Lessons Learnt

    Get PDF
    Analysing the treatment pathways in real-world health data can provide valuable insight for clinicians and decision-makers. However, the procedures for acquiring real-world data for research can be restrictive, time-consuming and risks disclosing identifiable information. Synthetic data might enable representative analysis without direct access to sensitive data. In the first part of our paper, we propose an approach for grading synthetic data for process analysis based on its fidelity to relationships found in real-world data. In the second part, we apply our grading approach by assessing cancer patient pathways in a synthetic healthcare dataset (The Simulacrum provided by the English National Cancer Registration and Analysis Service) using process mining. Visualisations of the patient pathways within the synthetic data appear plausible, showing relationships between events confirmed in the underlying non-synthetic data. Data quality issues are also present within the synthetic data which reflect real-world problems and artefacts from the synthetic dataset’s creation. Process mining of synthetic data in healthcare is an emerging field with novel challenges. We conclude that researchers should be aware of the risks when extrapolating results produced from research on synthetic data to real-world scenarios and assess findings with analysts who are able to view the underlying data

    Fraud detection in process aware systems

    No full text
    Nos últimos anos, algumas grandes empresas se envolveram em escândalos relacionados à má gestão financeira, o que representou um grande prejuízo financeiro para seus acionistas. Para recuperar a confiança do mercado, foram desenvolvidas certificações para as melhores práticas de governança e, em alguns casos, leis mais rígidas foram implementadas. As empresas aderiram a essas mudanças como uma resposta ao mercado, implantando sistemas de conhecimento de processos (PAS) e adotando as melhores práticas de governança. No entanto, as empresas demandam uma resposta rápida às mudanças estratégicas ou mudanças nos modelos de negócios entre os parceiros, o que pode impor sérios inconvenientes à adoção do PAS normativo para a competitividade dessas empresas. Assim, enquanto as empresas precisam de PAS flexível, a flexibilidade pode comprometer a segurança. Para reequilibrar o trade-off entre segurança e flexibilidade, apresentamos neste trabalho um algoritmo de detecção de anomalias para PAS. A identificação de eventos anômalos pode ajudar na adoção de PAS flexíveis sem a perda de propriedades de segurança.In the last years, some large companies have been involved in scandals related to financial mismanagement, which represented a large financial damage to their stockholders. To recover market confidence, certifications for best practices of governance were developed, and in some cases, harder laws were implemented. Companies adhered to these changes as a response to the market, deploying process aware systems (PAS) and adopting the best practices of governance. However, companies demand a rapid response to strategic changes or changes in business models between partners, which may impose serious drawbacks to the adoption of normative PAS to the competitiveness of these companies. Thus, while companies need flexible PAS, flexibility may compromise security. To re-balance the trade-off between security and flexibility, we present in this work an anomaly detection algorithm for PAS. The identification of anomalous events can help the adoption of flexible PAS without the loss of security properties

    Fraud Detection In Process Aware Systems

    No full text
    In the last years, some large companies have been involved in scandals related to financial mismanagement, which represented a large financial damage to their stockholders. To recover market confidence, certifications for best practices of governance were developed, and in some cases, harder laws were implemented. Companies adhered to these changes as a response to the market, deploying process aware systems (PAS) and adopting the best practices of governance. However, companies demand a rapid response to strategic changes or changes in business models between partners, which may impose serious drawbacks to the adoption of normative PAS to the competitiveness of these companies. Thus, while companies need flexible PAS, flexibility may compromise security. To re-balance the trade-off between security and flexibility, we present in this work an anomaly detection algorithm for PAS. The identification of anomalous events can help the adoption of flexible PAS without the loss of security properties. Copyright © 2011 Inderscience Enterprises Ltd.52121129Agarwal, D.K., An empirical Bayes approach to detect anomalies in dynamic multidimensional arrays (2005) ICDM, pp. 26-33Agrawal, R., Gunopulos, D., Leymann, F., Mining process models from workflow logs (1998) EDBT '98: Proceedings of the 6th International Conference on Extending Database Technology, (1377), pp. 469-483. , Advances in Database Technology - EDDT'98Bezerra, F., Wainer, J., Towards detecting fraudulent executions in business process aware systems (2007) WfPM 2007 - Workshop on Workflows and Process Management, in Conjunction with SYNASC 2007, , Timisoara, RomaniaBezerra, F., Wainer, J., Um método de detec cão de anomalias em logs de processos de negócios (2007) I Brazilian Workshop on Business Process Management, SBC, in Conjunction with Webmedia 2007, , de Toledo, M. B. F. and Madeira, E. M. Eds.: Gramado, RS, BrazilBezerra, F., Wainer, J., Anomaly detection algorithms in business process logs (2008) 10th International Conference on Enterprise Information Systems, pp. 11-18. , Barcelona, SpainBezerra, F., Wainer, J., Anomaly detection algorithms in logs of process aware systems (2008) SAC '08: Proceedings of the 2008 ACM Symposium on Applied Computing, pp. 951-952. , ACM, New York, NY, USACook, J.E., Wolf, A.L., Discovering models of software processes from event-based data (1998) ACM Transactions on Software Engineering and Methodology, 7 (3), pp. 215-249Cook, J.E., Du, Z., Liu, C., Wolf, A.L., Discovering models of behavior for concurrent workflows (2004) Computers in Industry, 53 (3), pp. 297-319De Medeiros, A.K.A., (2006) Genetic Process Mining, , PhD thesis, Technische Universiteit Eindhoven, Eindhoven, ISBN 978-90-386-0785-6De Medeiros, A.K.A., Van Der Aalst, W.M.P., Weijters, A., Workflow mining: Current status and future directions (2003) On the Move to Meaningful Internet Systems, LNCS, 2888. , Meersman, R., Tari, Z. and Schmidt, D. EdsDe Medeiros, A.K.A., Weijters, A.J.M.M., Van Der Aalst, W.M.P., Genetic process mining: A basic approach and its challenges (2006) Lecture Notes in Computer Science, 3812, pp. 203-215. , ISSN 0302-9743Donoho, S., Early detection of insider trading in option markets (2004) KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420-429. , KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data MiningFawcett, T., (2004) Roc Graphs: Notes and Practical Considerations for ResearchersFawcett, T., Provost, F., Adaptive fraud detection (1997) Data Mining and Knowledge Discovery, 1, pp. 291-316Hammori, M., Herbst, J., Kleiner, N., Interactive workflow mining-requirements, concepts and implementation (2006) Data and Knowledge Engineering, 56 (1), pp. 41-63. , DOI 10.1016/j.datak.2005.02.006, PII S0169023X05000273, Business Process ManagementHerbst, J., Karagiannis, D., Workflow mining with involve (2004) Computers in Industry, 53 (3), pp. 245-264Lee, W., Xiang, D., Information-theoretic measures for anomaly detection (2001) IEEE Symposium on Security and PrivacyMaruster, L., Van Der Aalst, W.M.P., Weijters, T., Van Den Bosch, A., Daelemans, W., Automated discovery of workflow models from hospital data (2001) Proceedings of the 13th Belgium-Netherlands Conference on Artificial Intelligence (BNAIC 2001), pp. 183-190. , Krse, B., Rijke, M., Schreiber, G. and Someren, M. EdsNoble, C.C., Cook, D.J., Graph-based anomaly detection (2003) KDD '03: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 631-636. , ACM Press, New York, NY, USAPandit, S., Chau, D.H., Wang, S., Faloutsos, C., Netprobe: A fast and scalable system for fraud detection in online auction networks (2007) 16th International World Wide Web Conference, WWW2007, pp. 201-210. , DOI 10.1145/1242572.1242600, 16th International World Wide Web Conference, WWW2007Pinter, S.S., Golani, M., Discovering workflow models from activities' lifespans (2004) Computers in Industry, 53 (3), pp. 283-296Rozinat, A., Van Der Aalst, W.M.P., Conformance checking of processes based on monitoring real behavior (2008) Information Systems, 33 (1), pp. 64-95. , DOI 10.1016/j.is.2007.07.001, PII S030643790700049XRozinat, A., Van Der Aalst, W.M.P., Conformance testing: Measuring the fit and appropriateness of event logs and process models (2005) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3812, pp. 163-176. , Business Process Management Workshops - BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, Revised Selected PapersRozinat, A., Medeiros, A.A., Günther, C., Weijters, A., Van Der Aalst, W.M.P., Towards an evaluating framework for process mining algorithms (2007) Technical Report, Technische Universiteit Eindhoven, , BETA Research School for Operations Management and LogisticsSabhnani, R., Neill, D., Moore, A., Detecting anomalous patterns in pharmacy retail data (2005) Proceedings of the KDD 2005 Workshop on Data Mining Methods for Anomaly DetectionSchimm, G., Mining exact models of concurrent workflows (2004) Comput. Ind., 53 (3), pp. 265-281Van Der Aalst, W.M.P., De Medeiros, A.K.A., Process mining and security: Detecting anomalous process executions and checking process conformance (2005) Electronic Notes in Theoretical Computer Science, 121 (SPEC. ISS.), pp. 3-21. , DOI 10.1016/j.entcs.2004.10.013, PII S1571066105000228Van Der Aalst, W.M.P., Weijters, A.J.M.M., Process mining: A research agenda (2004) Computers in Industry, 53Van Der Aalst, W.M.P., Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.J.M.M., Workflow mining: A survey of issues and approaches (2003) Data Knowl. Eng., 47 (2), pp. 237-267Van Der Aalst, W.M.P., Weijters, T., Maruster, L., Workflow mining: Discovering process models from event logs (2004) IEEE Trans. Knowl. Data Eng., 16 (9), pp. 1128-1142Wainer, J., Kim, K., Ellis, C.A., A workflow mining method through model rewriting (2005) Groupware: Design, Implementation, and Use: 11th International Workshop, CRIWG 2005, 3706, pp. 184-191. , Fuks, H., Lukosch, S. and Salgado, A. C. Eds.:, Porto de Galinhas, BrazilYang, W.-S., Hwang, S.-Y., A process-mining framework for the detection of healthcare fraud and abuse (2006) Expert Systems with Applications, 31 (1), pp. 56-6
    corecore