Interesting

SEEBURGER Goes Process Mining – An Adventure in Optimization

Process mining is awesome. It lets us identify both regular and non-regular processes from a lot of chaotic data, and we barely have to do anything! Like many other companies, we at SEEBURGER use several IT systems to do our daily work. Our idea was to use our own integration platform to read and compile the accruing data from all these systems and tools and analyze this using a process mining tool. In this article we look at what process mining is, how it works and how our integration platform can support this.

What is Process Mining?

According to Wikipedia, process mining is “…a process management technique that enables business processes to be reconstructed and evaluated on the basis of digital traces in IT systems.”[1]

I had difficulty understanding that sentence the first time I read it. Once I looked more closely at it, it became clearer. Let us deconstruct this sentence.

  • business processes
    Essentially, a business process is a structured sequence of activities with fixed start and end points. In theory, this sounds very simple. In many companies, however, the reality is different. There are often a large number of individual activities that are assigned to different processes and linked to each other. A company’s business processes therefore tend to resemble a tangle of dependent activities.
Figure 1: Processes can look quite different in reality
  • process management
    We define process management as analysing, designing, controlling and improving business processes. The aim is to increase their quality, efficiency or flexibility.
    When you manage a process, you always know who is responsible for what task, when it will be performed, and what resources are required for it.
  • digital traces in IT systems
    This explanation is quite simple. IT systems process data. Information about previous events and activities are gathered in (event) logs. These are the digital traces. Every IT system in a company creates an event log in a more or less detailed and structured way.
    We usually only use this data to analyze errors or, in individual cases, to track activities. That’s quite a lot of data that is rarely used! Most companies have mountains of unused data they could mine for insights.
Figure 2: Event log data piles up and usually remains unused

How does process mining work?

You may already have an idea of what this means:

Process mining is a method of analyzing such data mountains in a structured way. It lets you determine the actual processes behind these event logs.

This process analysis is known as discovery. Process mining requires no human intervention, rather works silently and independently behind the scenes to extract how processes actually occur in reality based on the mountains of data. That’s really awesome, isn’t it?

Both real-time and archive data can be used for discovery. The purpose is to analyze individual business processes or overall business processes across departments/companies.

This gives you a better understanding on the time and resources you need to allocate to each process. You can also use these detailed insights into how processes really run to identify where you can – or should – make improvements.

The results of this analysis is often quite different from what the process designers/managers originally intended.

Once you have defined a process, you can verify and document how well a processes complies with this in practice. This analysis is known as conformance. This is a key task in an audit, where auditors examine whether legal requirements or internal rules are being upheld.

And it is precisely these findings that are the focus of the third process mining use case, enhancement. This involves taking historical data and running simulations to optimise your processes.

Figure 3: The three main use cases in process mining are discovery, conformance and enhancement.

In summary, using process mining to optimise a process involves the following:

  • Collecting data from event logs
  • Running process discovery to identify what is really happening
  • Doing a conformance check to identify areas for improvement
  • Performing model enhancement to define a desired target model
  • Implementing the enhanced model
  • Continuous monitoring of the optimized processes and identifying further areas for improvement

Now we have looked at the theory behind process mining, let us look at how SEEBURGER can contribute to it. Alongside analyzing and evaluating our customers’ processes with the help of our integration platform, we have had extensive experience of process mining in-house.

Our key findings on process mining

One of the most significant surprises that we experienced in our analysis is that the actual processes that we analyzed on the basis of EDI data or event logs very rarely conformed to the theory. Even in our own business area, where everything has already been digitalized, the variants are unexpectedly high. Process mining lets you quickly and easily discover throughput times and how long individual steps actually take. It’s also quite simple to identify bottlenecks. Since process mining is industry-independent, we were also able to apply it to non-EDI processes, such as the question “Is our customer service working?”. This was based on ticket data. Fortunately, our integration platform can handle any interface that an IT system provides.

We also realized quite quickly that our original expectations weren’t realistic. You can’t just run an application’s event log through a process mining tool and hope for a result. All the process mining tools we considered expect prepared data. This always means a combination of data, which we refer to as a data triple. To be more specific, this means the following three types of information:

  • A unique case ID.
    The case ID identifies activities related to a specific process. For example, these could be an order number, a ticket number or some other identifier.
  • One or more related activities
    There must always be at least one activity for each case ID. Of course, there could be more than one. For example, if the case ID is a ticket number, an associated activity would be “open ticket” or “forward ticket”. If the case ID is an order number, the activity could be an order, an order response or an invoice.
  • Timestamp for each activity
    For sorting purposes, there must be a timestamp for each activity in the process. This allows you to see how long each step took in reality.
Figure 4: SEEBURGER’s integration platform prepares event log data for process mining

Let us go back to our key findings:

  • Providing data for process mining and process tracking is easy if there is a case ID.
  • Only structured data can be used for process mining.
  • The quality of the data is critical. The results will not be accurate if there isn’t enough data or this is incomplete.
  • You need to understand the process before you can optimize it.

Now, let’s look at how SEEBURGER can help you with your process mining.

How can we help your process mining?

Before you can run discovery on your data, it needs to be exported from your systems and prepared. At the heart of this is the data triple, which is a number of activities and timestamps that are assigned to a unique case ID.

As integration specialists, we have several decades of experience with interfaces and data preparation. We can get the data you need for process mining flowing to where you need it. We can also support in a consulting capacity and help answer the questions which arise. Is a particular process efficient? Are responsibilities clear? Would a certain change get to the root of the issue, or only treat the symptoms?

If you are planning to do process mining, we can support you in making the necessary data available.

Hopefully this article could give you a little insight into process mining. We are convinced that every company can benefit from it. As we said at the beginning, process mining is just awesome.

[1] Source: https://en.wikipedia.org/wiki/Process_mining . Accessed 09.03.2022


Source: https://blog.seeburger.com/seeburger-goes-process-mining-an-adventure-in-optimization/

Inline Feedbacks
View all comments
guest

Green Logistics: How Digitalization is Driving Sustainability in Logistics

Can digitalization help drive sustainability in the logistics sector? Oh yes! This is not merely possible, but in...

Industry 4.0 and Lean Management – How to Manage the Chaos

Value chains are becoming increasingly complex and networked. This is not only due to globalisation, but also to...

Extended Reality (XR) in the World of Work: Is A New Dimension of Productivity and Collaboration on the Verge of a Breakthrough?

In recent years, virtual reality (VR) and augmented reality (AR) have developed into fascinating technologies that are not...

The Digital Product Passport: Driving Sustainability with Digital Transparency

Soon, EU businesses will have to adopt Digital Product Passports (DPPs) for product lifecycle transparency or face penalties....

Predictive Maintenance – Part 2: How does predictive maintenance work?

This article follows our piece on Predictive Maintenance 101 – What Is It and Where Is It Used?...

Multi-Project Management: Project management tools and resource planning for a clear project portfolio

Maintaining an overview in project management is often a challenge. How do you set priorities? Which processes are...

Human-in-the-Loop (HITL): The Synergy of AI and Humans Working Together in Document Processing

Processing incoming documents, whether these are invoices, customer orders, order confirmations, delivery documents or more, is a critical...

Digitalization of the Automotive Industry: From Traditional EDI to Modern EDI Trends

EDI (Electronic Data Interchange) is a time-tested yet advanced technology for harmonized electronic document and information exchange. By...

Digital Darwinism Part 1: Disruptive Innovations Drive Digital Transformation

What happened to the dodo? Darwinism. As humans settled on the island of Mauritius, bringing rats, cats, pigs...

EU-NIS2 Verification Through Mapping to ISO 27001 Controls

EU-wide legislation on cyber security via the EU-NIS2 (Directive 2022/2555 of the European Union on the security of...

Real Time 101 – The Basics

IT systems are increasingly becoming more intelligent, networked and autonomous. This digital transformation not only makes a company’s...

Where Information and Operational Technologies Converge: The Importance of a MES (Manufacturing Execution System)

How do you create synergies created between information technology (IT) and operational technology (OT) in industry and manufacturing?...

Better Than Crypto – What’s the Deal With the Digital Euro?

+++ Update 2025 will be a decisive year for the digital euro. The project has reached its halfway...

How Do You Use the Kano Model?

Kano Series Part 2 – Surveying your customers. The Kano model lends itself particularly well to complex products...

SEEBURGER Goes Process Mining – An Adventure in Optimization

Process mining is awesome. It lets us identify both regular and non-regular processes from a lot of chaotic...

Cyber Security in the Metaverse

Challenges of futuristic business ecosystems Most people are familiar with the term “metaverse” these days, especially since Facebook’s...

What is edge computing, and why is edge computing important for processing real-time data?

Edge computing is cutting-edge technology that is transforming the way we process data in digitally networked ecosystems. But...

Synthetic Biology: Engineering Life for Industrial Innovation and Sustainable Future

The convergence of engineering principles with biological systems has given birth to one of the most transformative fields...

Natural Language Question Answering Systems – Get Quick Answers To Concrete Questions

I’m sure you’ve also spent loads of time searching for an answer to a specific question among the...

Types of Company Fusion and Their Effect on the Corporate IT Landscape

After mergers and acquisitions (M&A), the integration of the IT infrastructures of the companies involved is always an...