other information systems the process is performed
in a similar manner. The operating system registers
the usage of the scan gate control software and
allocates this software to the process. The only role
in the exemplary process that cannot be captured in
this manner is the delivery man. Third challenge:
The method must be able to recognize the external
and internal roles involved in the process.
The next challenge is it to differentiate between
the different process steps. In the example, the
differentiation between the process steps “assume
delivery” and “check quantity” can be performed by
different information systems. When the process
transfers from “check quantity” to “check quality”,
different roles and different systems allow one to
find out that different process steps are performed. A
differentiation on that level is at any rate impossible.
An example of this can be seen in the work of a
sourcing employee who works with an ERP system
and does everything in the sourcing process, from
ordering to invoice checks, on his or her own. Fourth
challenge: The method must discover the different
process steps and be able to see the limit of one
process step and the beginning of another one.
The fifth challenge is to find out the description
of the process. To that end, a lot of information is
collected from OCR or screen capturing, but their
interpretation is difficult. An example is the “check
quantity” process, and the question: how can we
derive that term? One approach would be to assign
the function to the location; another approach would
be to use the window title of the ERP system
(“delivery note”). Sometimes this task can be done
by manual configuration, or by screen capturing.
The fifth challenge is, therefore, that the method
must be able to determine the name of a process
step.
The sixth challenge is to recognize different
target locations (storage locations in the logistic
process) from logistics and from the transport of
goods. Therefore, these different locations have to
be distinguished in the process by using different
process interfaces. To meet this challenge, the
master data of the storage in the warehouse
management system could be used to help
understand the structure of the storage groups and
their functionality in the process. Another possibility
is to assign this information to the different
locations. When this information is available for
differentiation, the process interfaces into the storage
area can be reconstructed. The sixth challenge is:
The method must have knowledge that specifies the
environment.
6 CONCLUSION AND OUTLOOK
The contribution has shown that an automated
discovery of process models is possible when some
new approaches are applied. The investigation of
current approaches showed that systems and
technologies deliver valuable information about the
process flow, but a configuration for a case of
specific use is necessary. The main gap in the
research is the lack of consideration of human tasks
and environmental data.
For the research task to develop a new integrated
approach, a couple of challenges must be dealt with.
One of the most important requirements of a new
method is to see the corporation and its data sources
in an integrated manner. Another important topic is
the collection of data according to location, time and
their connection to the process model. No
satisfactory answer could be given to the research
question concerning which information about the
user and the environment has to be collected in order
to be able to sufficiently discover process models.
On one hand, information about location must be
available (for instance which task is performed
where), while on the other hand, the master data that
holds that information has to be investigated. In any
case, the demand for and benefit of that kind of input
can be shown. Finally, there remains the question of
how the recognition mechanism uses semantic
techniques. Here it might be possible that the user
has to assist the recognition mechanism to describe
the process models.
An open issue after creating process models is to
interpret these semi-formal models. To reach an
understanding about a process solely by using a
model is very difficult. The authors thinks that
human beings, too, will have to participate in that
process in the future.
REFERENCES
Accorsi R., Stocker T. (2012). On the Exploitation of
Process Mining for Security Audits: The Conformance
Checking Case. ACM Symposium on Applied
Computing. doi:10.1145/2245276.2232051
Bhart, P. (2014). Prediction Model Using Web Usage
Mining Techniques. IJCATR, Volume 3, Issue 12,
827-830. doi: 10.7753/IJCATR0312.1015
Gronau, N. (2015). Trends and Future Research in
Enterprise Systems. Lecture Notes in Business
Information Processing, Volume 198, 271-280.
Gronau, N., Müller, C., & Korf, R. (2005). KMDL –
Capturing, Analysing and Improving Knowledge-
Fifth International Symposium on Business Modeling and Software Design
24