Discovering work prioritisation patterns from event logs
نویسندگان
چکیده
Business process improvement initiatives typically employ various process analysis techniques, including evidence-based analysis techniques such as process mining, to identify new ways to streamline current business processes. While plenty of process mining techniques have been proposed to extract insights about the way in which activities within processes are conducted, techniques to understand resource behaviour are limited. At the same time, an understanding of resources behaviour is critical to enable intelligent and effective resource management an important factor which can significantly impact overall process performance. The presence of detailed records kept by today’s organisations, including data about who, how, what, and when various activities were carried out by resources, open up the possibility for real behaviours of resources to be studied. This paper proposes an approach to analyse one aspect of resource behaviour: the manner in which a resource prioritises his/her work. The proposed approach has been formalised, implemented, and evaluated using a number of synthetic and real datasets. © 2017 Elsevier B.V. All rights reserved.
منابع مشابه
Discovering Coordination Patterns using Process Mining
Recently, process mining has become a vivid research area [5, 6]. The basic idea of process mining is to diagnose business processes by mining event logs for knowledge. Process mining techniques and tools provide the means for discovering process, control, data, organizational, and social structures from event logs. In this paper we provide an overview of process mining techniques/tools and the...
متن کاملTWINCLE : A Constrained Sequential Rule Mining Algorithm for Event Logs
Discovering workflow patterns in event-logs is important for many organizations to understand and optimize organizational processes. Although numerous algorithms have been proposed in the literature to discover patterns in sequences of symbols, most of them are inadequate to discover patterns in rich event-log data. In this paper, motivated by the analysis of patient pathways in the health doma...
متن کاملDiscovering Process Models from Unlabelled Event Logs
Existing process mining techniques are able to discover process models from event logs where each event is known to have been produced by a given process instance. In this paper we remove this restriction and address the problem of discovering the process model when the event log is provided as an unlabelled stream of events. Using a probabilistic approach, it is possible to estimate the model ...
متن کاملIntrusion alert prioritisation and attack detection using post-correlation analysis
Event Correlation used to be a widely used technique for interpreting alert logs and discovering network attacks. However, due to the scale and complexity of today’s networks and attacks, alert logs produced by these modern networks are much larger in volume and difficult to analyse. In this research we show that adding post-correlation methods can be used alongside correlation to significantly...
متن کاملEMailAnalyzer: An E-Mail Mining Plug-in for the ProM Framework
Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “event log”, i.e., a log recording the execution of activities. Thus far, process mining has been focusing on such structured event logs resulting in powerful analysis techniques and tools for discovering process, control, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Decision Support Systems
دوره 100 شماره
صفحات -
تاریخ انتشار 2017