Mining E-Mail Messages: Uncovering Interaction Patterns and Processes using E-Mail Logs

نویسندگان

  • Wil M. P. van der Aalst
  • Andriy Nikolov
چکیده

Buzzwords such as BAM (Business Activity Monitoring), BOM (Business Operations Management), BPI (Business Process Intelligence) illustrate the interest in closing the business process management loop (van der Aalst and van Hee, 2002; Dumas et al., 2005). This is illustrated by the Figure 1, which shows the increasing level of support for closing the so-called BPM lifecycle. The lifecycle identifies four different phases: process design (i.e., making a workflow schema), system configuration (i.e., getting a system to support the designed process), process enactment aBStraCt

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EMailAnalyzer: An E-Mail Mining Plug-in for the ProM Framework

Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “event log”, i.e., a log recording the execution of activities. Thus far, process mining has been focusing on such structured event logs resulting in powerful analysis techniques and tools for discovering process, control, ...

متن کامل

A Genre Analysis of Reprint Request E-mails Written by EFL and Physics Professionals

The present study aimed to analyze reprint request e-mail messages written by postgraduates (MA students) of two fields of study, namely Physics and EFL, to realize the differences and similarities between the two email types. To investigate the purpose of the study, a sample of 100 e-mail messages, 50 Physics and 50 EFL, were analyzed according to Swales’ (1990) model for reprint requests and ...

متن کامل

Mining Email Data

E-mail has become one of the most important communication media for business and private purposes. Large amounts of past e-mail records reside on corporate servers and desktop clients. There is a huge potential for mining this data. E-mail filing and spam filtering are wellestablished e-mail mining tasks. E-mail filing addresses the assignment of incoming e-mails to predefined categories to sup...

متن کامل

A Critical Functional Approach to Educational Discourses of Students and Professors over the Internet Context

This paper investigated the ways Iranian B.A and M.A students of English language and their professors represent themselves linguistically in their e-mails in general, and the ways they construct and negotiate power with regard to social and cultural norms in particular. It examined 84 e-mail messages students and professors exchanged in 2012-2013 academic year through Halliday`s Systemic Funct...

متن کامل

Examining students' online interaction in a live video streaming environment using data mining and text mining

0747-5632/$ see front matter 2012 Elsevier Ltd. A http://dx.doi.org/10.1016/j.chb.2012.07.020 ⇑ Tel.: +1 757 683 5008; fax: +1 757 683 5639. E-mail address: [email protected] This study analyses the online questions and chat messages automatically recorded by a live video streaming (LVS) system using data mining and text mining techniques. We apply data mining and text mining techniques to analyze tw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJIIT

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2008