Generating event logs from non-process-aware systems enabling business process mining

被引:41
作者
Perez-Castillo, Ricardo [1 ]
Weber, Barbara [2 ]
Pinggera, Jakob [2 ]
Zugal, Stefan [2 ]
Garcia-Rodriguez de Guzman, Ignacio [1 ]
Piattini, Mario [1 ]
机构
[1] Univ Castilla La Mancha, Alarcos Res Grp, E-13071 Ciudad Real, Spain
[2] Univ Innsbruck, A-6020 Innsbruck, Austria
关键词
process mining; event log; dynamic analysis; modernisation; legacy system;
D O I
10.1080/17517575.2011.587545
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As information systems age they become legacy information systems (LISs), embedding business knowledge not present in other artefacts. LISs must be modernised when their maintainability falls below acceptable limits but the embedded business knowledge is valuable information that must be preserved to align the modernised versions of LISs with organisations' real-world business processes. Business process mining permits the discovery and preservation of all meaningful embedded business knowledge by using event logs, which represent the business activities executed by an information system. Event logs can be easily obtained through the execution of process-aware information systems (PAISs). However, several non-process-aware information systems also implicitly support organisations' business processes. This article presents a technique for obtaining event logs from traditional information systems ( without any in-built logging functionality) by statically analysing and modifying LISs. The technique allows the modified systems to dynamically record event logs. The approach is validated with a case study involving a healthcare information system used in Austrian hospitals, which shows the technique obtains event logs that effectively and efficiently enable the discovery of embedded business processes. This implies the techniques provided within the process mining field, which are based on event logs, may also be applied to traditional information systems.
引用
收藏
页码:301 / 335
页数:35
相关论文
共 41 条
[1]  
Ammann P., 2016, INTRO SOFTWARE TESTI
[2]  
[Anonymous], 2006, 147642006 ISOIEC
[3]  
[Anonymous], 2002, LEGACY SYSTEMS TRANS
[4]  
[Anonymous], 2019, Business Process Management: Concepts, Languages, Architectures
[5]  
Brereton Pearl., 2008, Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering, P41
[6]   Business Process Recovery for System Maintenance - An Empirical Approach [J].
Cai, Zhengong ;
Yang, Xiaohu ;
Wang, Xinyu .
2009 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, CONFERENCE PROCEEDINGS, 2009, :399-402
[7]  
Castellanos M., 2009, Handbook of research on business process modeling, P456, DOI DOI 10.4018/978-1-60566-288-6.CH021
[8]   A Systematic Survey of Program Comprehension through Dynamic Analysis [J].
Cornelissen, Bas ;
Zaidman, Andy ;
van Deursen, Arie ;
Moonen, Leon ;
Koschke, Rainer .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2009, 35 (05) :684-702
[9]  
Davis J., 2006, P 23 INT C MACH LEAR, P233, DOI [10.1145/1143844.1143874, DOI 10.1145/1143844.1143874]
[10]   Genetic process mining: an experimental evaluation [J].
de Medeiros, A. K. A. ;
Weijters, A. J. M. M. ;
van der Aalst, W. M. P. .
DATA MINING AND KNOWLEDGE DISCOVERY, 2007, 14 (02) :245-304