Process Trace Identification from Unstructured Execution Logs

Many real world business processes are executed without explicit orchestration and hence do not generate structured execution logs. This is particularly true for the class of business processes which are executed in service delivery centers in emerging markets where rapid changes in processes and in the people executing the processes are common. In such environments, the process execution logs are usually natural language descriptions of actions performed and hence are noisy. Despite the lack of structured logs, it is crucial to know the trace of activities as they happen on the ground. Without such a visibility into the ground activities, regulatory compliance audit, process optimization, and best practices standardization are severely disabled. Process monitoring on top of unstructured execution logs has been a relatively unexplored research area. This paper proposes an approach for process trace identification from unstructured logs that applies state-of-the-art text mining techniques. It applies this approach on logs of a real-world business process used in a service delivery center and shows that individual process activities are correctly identified 90% of the time. Also, 65% of the activity traces were identified with zero errors and an additional 24% with a single error. This approach is generic and applicable to a wide array of business processes.

[1]  Guido Governatori,et al.  Temporalised normative positions in defeasible logic , 2005, ICAIL '05.

[2]  Boudewijn F. van Dongen,et al.  Workflow mining: A survey of issues and approaches , 2003, Data Knowl. Eng..

[3]  Boudewijn F. van Dongen,et al.  ProM: The Process Mining Toolkit , 2009, BPM.

[4]  Wil M.P. van der Aalst,et al.  Fuzzy Mining - Adaptive Process Simplification Based on Multi-perspective Metrics , 2007, BPM.

[5]  Insup Lee,et al.  Checking Traces for Regulatory Conformance , 2008, RV.

[6]  Wil M. P. van der Aalst,et al.  Conformance checking of processes based on monitoring real behavior , 2008, Inf. Syst..

[7]  Shazia Wasim Sadiq,et al.  Modeling Control Objectives for Business Process Compliance , 2007, BPM.

[8]  Josep Carmona,et al.  A Region-Based Algorithm for Discovering Petri Nets from Event Logs , 2008, BPM.

[9]  Marielba Zacarias,et al.  Approaching Process Mining with Sequence Clustering: Experiments and Findings , 2007, BPM.

[10]  Fabio Casati,et al.  Message Correlation for Conversation Reconstruction in Service Interaction Logs , 2007 .

[11]  Shazia Wasim Sadiq,et al.  Compliance checking between business processes and business contracts , 2006, 2006 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC'06).

[12]  Anuradha Bhamidipaty,et al.  Compliance Measurement Framework (CMF) , 2008, 2008 IEEE Congress on Services - Part I.

[13]  Fabrizio Sebastiani,et al.  Machine learning in automated text categorization , 2001, CSUR.

[14]  Wil M. P. van der Aalst,et al.  Finding Structure in Unstructured Processes: The Case for Process Mining , 2007, Seventh International Conference on Application of Concurrency to System Design (ACSD 2007).

[15]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[16]  Fabrizio Sebastiani,et al.  Machine learning in automated text categorisation: a survey , 1999 .

[17]  Aditya K. Ghose,et al.  Auditing Business Process Compliance , 2007, ICSOC.

[18]  Song,et al.  Supporting proces mining by showing events at a glance , 2007 .