other information systems the process is performed 
in a similar manner. The operating system registers 
the usage of the scan gate control software and 
allocates this software to the process. The only role 
in the exemplary process that cannot be captured in 
this manner is the delivery man. Third challenge: 
The method must be able to recognize the external 
and internal roles involved in the process. 
The next challenge is it to differentiate between 
the different process steps. In the example, the 
differentiation between the process steps “assume 
delivery” and “check quantity” can be performed by 
different information systems. When the process 
transfers from “check quantity” to “check quality”, 
different roles and different systems allow one to 
find out that different process steps are performed. A 
differentiation on that level is at any rate impossible. 
An example of this can be seen in the work of a 
sourcing employee who works with an ERP system 
and does everything in the sourcing process, from 
ordering to invoice checks, on his or her own. Fourth 
challenge: The method must discover the different 
process steps and be able to see the limit of one 
process step and the beginning of another one.  
The fifth challenge is to find out the description 
of the process. To that end, a lot of information is 
collected from OCR or screen capturing, but their 
interpretation is difficult. An example is the “check 
quantity” process, and the question: how can we 
derive that term? One approach would be to assign 
the function to the location; another approach would 
be to use the window title of the ERP system 
(“delivery note”). Sometimes this task can be done 
by manual configuration, or by screen capturing. 
The fifth challenge is, therefore, that the method 
must be able to determine the name of a process 
step. 
The sixth challenge is to recognize different 
target locations (storage locations in the logistic 
process) from logistics and from the transport of 
goods. Therefore, these different locations have to 
be distinguished in the process by using different 
process interfaces. To meet this challenge, the 
master data of the storage in the warehouse 
management system could be used to help 
understand the structure of the storage groups and 
their functionality in the process. Another possibility 
is to assign this information to the different 
locations. When this information is available for 
differentiation, the process interfaces into the storage 
area can be reconstructed. The sixth challenge is: 
The method must have knowledge that specifies the 
environment. 
6 CONCLUSION AND OUTLOOK 
The contribution has shown that an automated 
discovery of process models is possible when some 
new approaches are applied. The investigation of 
current approaches showed that systems and 
technologies deliver valuable information about the 
process flow, but a configuration for a case of 
specific use is necessary. The main gap in the 
research is the lack of consideration of human tasks 
and environmental data. 
For the research task to develop a new integrated 
approach, a couple of challenges must be dealt with. 
One of the most important requirements of a new 
method is to see the corporation and its data sources 
in an integrated manner. Another important topic is 
the collection of data according to location, time and 
their connection to the process model. No 
satisfactory answer could be given to the research 
question concerning which information about the 
user and the environment has to be collected in order 
to be able to sufficiently discover process models. 
On one hand, information about location must be 
available (for instance which task is performed 
where), while on the other hand, the master data that 
holds that information has to be investigated. In any 
case, the demand for and benefit of that kind of input 
can be shown. Finally, there remains the question of 
how the recognition mechanism uses semantic 
techniques. Here it might be possible that the user 
has to assist the recognition mechanism to describe 
the process models. 
An open issue after creating process models is to 
interpret these semi-formal models. To reach an 
understanding about a process solely by using a 
model is very difficult. The authors thinks that 
human beings, too, will have to participate in that 
process in the future. 
REFERENCES 
Accorsi R., Stocker T. (2012). On the Exploitation of 
Process Mining for Security Audits: The Conformance 
Checking Case. ACM Symposium on Applied 
Computing. doi:10.1145/2245276.2232051 
Bhart, P. (2014). Prediction Model Using Web Usage 
Mining Techniques. IJCATR, Volume 3, Issue 12, 
827-830. doi: 10.7753/IJCATR0312.1015 
Gronau, N. (2015). Trends and Future Research in 
Enterprise Systems. Lecture Notes in Business 
Information Processing, Volume 198, 271-280. 
Gronau, N., Müller, C., & Korf, R. (2005). KMDL – 
Capturing, Analysing and Improving Knowledge- 
Fifth International Symposium on Business Modeling and Software Design
24